Browse Definitions:

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • augmented intelligence

    Augmented intelligence is an alternative conceptualization of artificial intelligence that emphasizes AI's assistive role, supplementing human intelligence rather than replacing it.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server.

  • Accounts receivable (AR)

    Accounts receivable (AR) is an item in the general ledger (GL) that shows money owed to a business by customers who have purchased goods or services on credit.

View All Business software Definitions

Business terms

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • red herring

    A red herring is a logical fallacy in which irrelevant information is presented alongside relevant information, distracting attention from that relevant information.

  • cross-media ownership

    Media cross-ownership is a situation in which a single corporate entity owns multiple types of media companies. The types of media companies owned may include print, radio, television, movie and internet media sites.

  • frictionless commerce

    Frictionless commerce is a method of using data from devices, apps and websites to integrate buying opportunities as simply and seamlessly as possible into consumers’ everyday activities and natural environments.

View All Business terms Definitions Back to Top

Compliance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative expression, including books, video, movies, music and computer programs.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.

  • Open Internet Order of 2010

    The Open Internet Order of 2010 is a set of rules proposed by the United States Federal Communications Commission (FCC) with the purpose of maintaining an open and neutral internet that supports free speech and generally treats all traffic as equal.

View All Compliance Definitions Back to Top

Customer relationship management

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • frictionless commerce

    Frictionless commerce is a method of using data from devices, apps and websites to integrate buying opportunities as simply and seamlessly as possible into consumers’ everyday activities and natural environments.

  • vertical search engine

    A vertical search engine is a search engine that is dedicated to a particular area of focus.

  • passenger name record (PNR)

    A passenger name record (PNR) is a collection of data pertaining to an individual air traveler or a group of individuals travelling together. Airlines use PNRs for management of customer data, security and customer valuation and may share that data with government agencies.

View All Customer relationship management Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • vehicle to infrastructure (V2I or v2i)

    Vehicle-to-infrastructure (V2I or V2X) is a communication model that allows vehicles to share information with the components that support a country's highway system. Such components include overhead RFID readers and cameras, traffic lights, lane markers, streetlights, signage and parking meters. V2I communication is typically wireless and bi-directional: data from infrastructure components can be delivered to the vehicle and vice versa.

  • Centers for Disease Control and Prevention (CDC)

    Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

View All Healthcare IT Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • ERP (enterprise resource planning)

    Enterprise resource planning (ERP) is an industry term for the broad set of activities that help an organization manage its business. An important goal of ERP software is to facilitate the flow of information so business decisions can be data-driven.

  • original equipment manufacturer (OEM)

    Original equipment manufacturer (OEM) is a broad term that describes a web of relationships among IT hardware vendors, component makers such as microprocessor manufacturers, software vendors, and channel partners such as resellers and distributors.

  • ISV (independent software vendor)

    An ISV (independent software vendor) makes and sells software products that run on a physical hardware device, on a virtual machine or in the cloud.

View All IT procurement Definitions Back to Top

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server.

  • municipal broadband

    Municipal broadband is high-bandwidth internet access that is funded either in part or completely by municipal government.

  • Microsoft Hyper-V NIC teaming

    Microsoft Hyper-V NIC teaming is the process of grouping multiple virtual network interface cards (NICs) across different physical NICs to increase bandwidth and provide redundancy.

View All Network administration Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • consultant (consulting)

    A consultant is an experienced individual in a given field who provides expert advice for a fee. Consultants typically work as independent contractors and are hired on a short-term basis. A consultant may also be an employee at a consulting firm.

  • reality check

    A reality check is a second opinion, either requested or provided voluntarily, about the status of some current situation. Reality checks are a less formalized version of fact checking.

  • adulting

    Adulting is the assumption of tasks and behaviors associated with normal grown-up life, along with the implication that the individual in question does not particularly identify as an adult.

View All Project management Definitions Back to Top

SEO

Terms related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • Project Owl

    Project Owl is an endeavor by Google to try to reduce the amount of fake news and hate speech from showing in its search results.

  • vertical search engine

    A vertical search engine is a search engine that is dedicated to a particular area of focus.

  • keyword (in SEO)

    A keyword is a term chosen to describe the content of a web page. The purpose is to improve the page’s search engine optimization (SEO) value, which determines its position on a search engine results page (SERP) and the likelihood that it will be found by users.

View All SEO Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • dongle

    A dongle (pronounced DONG-uhl) is a mechanism for ensuring that only authorized users can copy or use specific software applications, especially very expensive programs.

  • behavior-based security

    Behavior-based security is a proactive approach to managing security incidents that involves monitoring end user devices, networks and servers in order to flag or block suspicious activity.

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.

View All Security management Definitions Back to Top

Software management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • chief integration officer (CIO)

    A chief integration officer (CIO) is a corporate executive in charge of ensuring the coordination of all interacting systems within the enterprise and its extended environments.

  • cloud bursting

    Cloud bursting is an application deployment model in which an application normally runs in a private cloud or local data center but can also run in a public cloud when the demand for computing capacity spikes.

  • DevOps as a Service

    DevOps as a Service (DaaS) is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team. In this delivery model, the DaaS provider collects the disparate tools that cover various aspects of the overall process and connects these tools to work together as one unit.

View All Software management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • online data backup (remote data backup)

    Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a provider.

  • ZFS

    ZFS is a local file system and logical volume manager created by Sun Microsystems to control the placement, storage and retrieval of data in enterprise computing systems.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • data migration

    Data migration is the process of transferring data between data storage systems, data formats or computer systems.

  • compact disc (CD)

    A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data ...

SearchSolidStateStorage

  • NVMe (non-volatile memory express)

    NVMe (non-volatile memory express) is a host controller interface and storage protocol to enable a solid-state drive to use the ...

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close