Browse Definitions:

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • Microsoft SQL Server

    Microsoft SQL Server is a relational database management system, or RDBMS, that supports a wide variety of transaction processing, business intelligence and analytics applications in corporate IT environments

  • software robotics

    Software robotics is the use of bot programs to automate computer tasks normally performed by people. Software robotics is synonymous with robotic process automation (RPA) and is the less widely used term, except in the financial services industry.

  • Microsoft Windows 10 Long Term Servicing Branch

    Microsoft Windows 10 Long Term Servicing Branch is a licensing structure available for operating system updates in Windows 10 Enterprise.

View All Business software Definitions

Business terms

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • Scrum

    Scrum is a collaborative Agile development framework that breaks large processes down into small pieces in order to streamline efficiency.

  • retargeting (remarketing)

    Retargeting, also known as remarketing, is advertising that features specific products or services and targets an individual who has viewed them online.

  • targeted ad (targeted advertising)

    A targeted ad, in online marketing, is an advertisement that is served to a specific audience, which could be a particular demographic, a group or an individual.

View All Business terms Definitions Back to Top

Compliance

Terms related to compliance, including regulatory definitions and words and phrases about governance and mitigating IT risk.

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • electronic logging device (ELD)

    An electronic logging device (ELD) is electronic hardware used to record the working hours of a commercially-operated motor vehicle.

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public companies in the United States to protect investors' interests.

View All Compliance Definitions Back to Top

Customer relationship management

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • retargeting (remarketing)

    Retargeting, also known as remarketing, is advertising that features specific products or services and targets an individual who has viewed them online.

  • ad server

    An ad server is software that stores advertising content and delivers it to websites and applications.

  • targeted ad (targeted advertising)

    A targeted ad, in online marketing, is an advertisement that is served to a specific audience, which could be a particular demographic, a group or an individual.

View All Customer relationship management Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • cybersecurity

    Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

  • FRCP Rule 41

    FRPC Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.

  • Office of Personnel Management (OPM)

    The Office of Personnel Management (OPM) is an independent agency of the United States government that is tasked with the oversight of civil service hirings.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • national provider identifier (NPI)

    A national provider identifier (NPI) is a unique ten-digit identification number required by HIPAA for covered healthcare providers in the United States.

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician practices and hospitals.

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare coverage.

View All Healthcare IT Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • original equipment manufacturer (OEM)

    Original equipment manufacturer (OEM) is a broad term that describes a web of relationships among IT hardware vendors, component makers such as microprocessor manufacturers, software vendors, and channel partners such as resellers and distributors.

  • ERP (enterprise resource planning)

    Enterprise resource planning (ERP) is an industry term for the broad set of activities that help an organization manage its business.

  • ISV (independent software vendor)

    An ISV (independent software vendor) makes and sells software products that run on a physical hardware device, on a virtual machine or in the cloud.

View All IT procurement Definitions Back to Top

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all other applications from running.

  • computer network

    In information technology, a computer network, also called a data network, is a series of points, or nodes, interconnected by communication paths for the purpose of transmitting, receiving and exchanging data, voice and video traffic.

  • memory dump

    A memory dump is the process of taking all information content in RAM and writing it to a storage drive. Developers commonly use memory dumps to gather diagnostic information at the time of a crash to help them troubleshoot issues and learn more about the event.

View All Network administration Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • availability bias

    The availability bias is the human tendency to think that examples of things that come readily to mind are more representative than is actually the case.

  • critical thinking

    Critical thinking is the capacity to be objective, rational and analytical about subjects, situations and cognitive problems. An essential element of critical thinking is human efforts dedicated to the continuous improvement of our cognitive abilities.

  • Mandela effect

    The Mandela effect is the observed phenomenon of people misremembering significant events and facts, often leading to false memories of things that didn't actually happen. The phenomenon is named for Nelson Mandela because many people mistakenly believe he died in prison in the 1980s.

View All Project management Definitions Back to Top

SEO

Terms related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • semantic search

    Semantic search is an approach to locating information on the internet in which programming predicts context for a query. The goal of semantic search is to provide the end user with the most relevant search engine results possible.

  • migration

    In information technology (IT), migration is the process of moving from the use of one operating environment to another operating environment that is, in most cases, thought to be a better one.

  • search engine marketing (SEM)

    Search engine marketing (SEM) is an approach to advertising that helps companies' content rank higher in search engine queries.

View All SEO Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • holistic security

    Holistic security is an approach that seeks to integrate all the elements designed to safeguard an organization, considering them as a complex and interconnected system.

  • critical thinking

    Critical thinking is the capacity to be objective, rational and analytical about subjects, situations and cognitive problems. An essential element of critical thinking is human efforts dedicated to the continuous improvement of our cognitive abilities.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple different locations or networks.

View All Security management Definitions Back to Top

Software management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • Microsoft Windows 10 Long Term Servicing Branch

    Microsoft Windows 10 Long Term Servicing Branch is a licensing structure available for operating system updates in Windows 10 Enterprise.

  • JAR file (Java Archive)

    A Java Archive, or JAR file, contains all of the various components that make up a self-contained, executable Java application, deployable Java applet or, most commonly, a Java library to which any Java Runtime Environment can link.

  • Microsoft Online Services Sign-In Assistant

    The Microsoft Online Services Sign-In Assistant is a software application that provides common sign-on capabilities for a suite of Microsoft online services, such as Office 365.

View All Software management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store multiple petabytes of data.

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte or bit in computing and telecommunications.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so data requests can be met with improved speed.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • national provider identifier (NPI)

    A national provider identifier (NPI) is a unique ten-digit identification number required by HIPAA for covered healthcare ...

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close