Browse Definitions:

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.


Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • Amazon Prime

    Amazon Prime is a subscription membership to Amazon that offers customers premium services for a yearly or monthly fee.

  • CIO (Chief Information Officer)

    A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation. In addition to overseeing the hardware, software and data that helps other members of the C-suite do their jobs effectively, the CIO must research new technologies, strategize how technology can provide business value and address the risks associated with digital information.

  • hard skills

    Hard skills are specific abilities, or capabilities, that an individual can possess and demonstrate in a measured way.

View All ERP Definitions

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • customer experience management (CEM or CXM)

    Customer experience management (CEM or CXM) is the collection of processes a company uses to track, oversee and organize every interaction between a customer and the organization.

  • Eloqua

    Eloqua is a platform for automation of enterprise-level electronic marketing, offered by Oracle.

  • Marketo

    Marketo is a platform for the automation of marketing activities; the platform is designed for medium-sized businesses.

View All Business software Definitions Back to Top


This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

View All Compliance Definitions Back to Top


Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • sampling error

    A sampling error is a problem in the way that members of a population are selected for research or data collection, which impacts the validity of results.

  • sample

    A sample, in the context of scientific research and statistics, is a representative subset of a population.

  • speech analytics

    Speech analytics is the process of analyzing voice recordings or live customer calls to contact centers with speech recognition software to find useful information and provide quality assurance.

View All CRM Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.'

  • Americans with Disabilities Act (ADA) compliance

    Americans with Disabilities Act (ADA) compliance is the adherence to the standards put forth forth in the United States legislation.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device innovation, mental health research and care, opioid addiction treatment and prevention, and health information technology.

  • vendor neutral archive (VNA)

    A vendor neutral archive (VNA) is a technology that stores medical images in a standard format and interface, making them accessible to healthcare professionals regardless of what proprietary system created the images.

  • Epic Systems

    Epic Systems is one of the largest providers of health information technology, used primarily by large U.S. hospitals and health systems to access, organize, store and share electronic medical records.

View All Healthcare IT Definitions Back to Top

HR management

  • transfer learning

    Transfer learning is the application of knowledge gained from completing one task to help solve a different, but related, problem.

  • catchball

    Catchball is an approach to decision-making in an organization or group where ideas are pitched from one individual to another throughout the group’s hierarchy and divisions.

  • acquihire

    An acquihire is the purchase of one company by another for the sole purpose of retaining the business' staff.

View All HR management Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • supply chain management (SCM)

    Supply chain management (SCM) is the broad range of activities required to plan, control and execute a product's flow, from acquiring raw materials and production through distribution to the final customer, in the most streamlined and cost-effective way possible.

  • managed service provider (MSP)

    A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.

  • Apple Authorized Service Provider (Apple AASP)

    An Apple Authorized Service Provider (AASP) is a business that provides repair services for Apple products.

View All IT procurement Definitions Back to Top

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • DNS redirection

    DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.

  • fault management

    Fault management is the component of network management concerned with detecting, isolating and resolving problems.

  • virtualization sprawl (VM sprawl)

    Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where the administrator can no longer manage them effectively. 

View All Network administration Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • validated learning

    Validated learning is an approach to demonstrating progress against business goals when traditional key performance indicators (KPIs) are not very useful.

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks, costs and deadlines.

  • corporate culture model

    A corporate culture model is the organizing principle behind the values, beliefs and attitudes that characterize a company and guide its practices.clans and market-based models.

View All Project management Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all enterprises in the group.

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a network.

  • mobile application management (MAM)

    Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.

View All Security management Definitions Back to Top


Definitions related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • affiliate marketing

    Affiliate marketing is a performance-based marketing strategy in which one company pays another for referred business.

  • PageRank

    PageRank (PR) is Google’s main method of ranking web pages for placement on a search engine results page (SERP). PageRank refers to the system and the algorithmic method that Google uses to rank pages as well as the numerical value assigned to pages as a score.

  • nofollow

    Nofollow is a meta tag that can be added to a site’s robots.txt file or to individual links to stop search engine webcrawlers from following links on the page.

View All SEO Definitions Back to Top

Software management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • performance management software

    Performance management software is designed to improve business performance by spurring employee productivity.

  • predictive analytics

    Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast activity, behavior and trends.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work.

View All Software management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • NetApp SolidFire

    NetApp SolidFire is a business division of NetApp Inc. that specializes in all-flash storage systems.

  • private cloud storage (internal cloud storage)

    Private cloud storage, also called internal cloud storage, is a service delivery model for storage within a large enterprise.

View All Storage management Definitions Back to Top



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...


  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.