Browse Definitions:

IT Management

Definitions about information technology management including compliance vocabulary, business terminology, words about security, storage, network and software management and search engine optimization (SEO).

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • Workday

    Workday is a web-based ERP software vendor that specializes in human capital management and financial management applications.

  • web content management system (WCMS)

    A web content management system (WCMS) is a set of tools that can be used by nontechnical users to organize and manage digital information on websites.

  • Amazon EC2 (Elastic Compute Cloud)

    Amazon Elastic Compute Cloud is an Amazon Web Services cloud server hosting tool that allows a business to provision resources for public cloud IT projects.

View All Business software Definitions

Business terms

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • demand generation (demand gen)

    Demand generation (demand gen) is an umbrella term for customer acquisition initiatives that are designed to drive awareness and interest about a company’s product or service in order to attract qualified leads.

  • Shared Assessments Program

    Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation work and testing.

View All Business terms Definitions Back to Top

Compliance

Terms related to compliance, including regulatory definitions and words and phrases about governance and mitigating IT risk.

  • Shared Assessments Program

    Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation work and testing.

  • VUCA (volatility, uncertainty, complexity and ambiguity)

    VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity, a combination of qualities that, taken together, characterize the nature of some difficult conditions and situations.

View All Compliance Definitions Back to Top

Customer relationship management

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • demand generation (demand gen)

    Demand generation (demand gen) is an umbrella term for customer acquisition initiatives that are designed to drive awareness and interest about a company’s product or service in order to attract qualified leads.

  • public relations (PR)

    Public relations (PR) is the use of communications to manage public perception of an individual or an organization. PR is ingrained in the culture of most larger enterprises.

  • agile marketing

    Agile marketing is an iterative approach to marketing strategies that models methodologies used in agile software development. With agile marketing, teams identify and focus their collective efforts on high value projects, complete those projects cooperatively, measure their impact, and then continuously and incrementally improve results over time.

View All Customer relationship management Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • cybersecurity

    Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

  • FRCP Rule 41

    FRPC Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.

  • Office of Personnel Management (OPM)

    The Office of Personnel Management (OPM) is an independent agency of the United States government that is tasked with the oversight of civil service hirings.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • cybersecurity

    Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a contract between a HIPAA-covered entity and a HIPAA business associate (BA).

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the telecommunications infrastructure.

View All Healthcare IT Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • ERP (enterprise resource planning)

    Enterprise resource planning (ERP) is an industry term for the broad set of activities that help an organization manage its business.

  • ISV (independent software vendor)

    An ISV (independent software vendor) makes and sells software products that run on a physical hardware device, on a virtual machine or in the cloud.

  • monopoly

    Monopolies may result from a lack of competing companies in a given market or a limited number of companies that are strong competitors. These conditions can arise naturally but they are sometimes the result of aggressive, questionable and potentially illegal business practices including industrial espionage and backdoor selling.

View All IT procurement Definitions Back to Top

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all other applications from running.

  • computer network

    In information technology, a computer network, also called a data network, is a series of points, or nodes, interconnected by communication paths for the purpose of transmitting, receiving and exchanging data, voice and video traffic.

  • memory dump

    A memory dump is the process of taking all information content in RAM and writing it to a storage drive. Developers commonly use memory dumps to gather diagnostic information at the time of a crash to help them troubleshoot issues and learn more about the event.

View All Network administration Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • VUCA (volatility, uncertainty, complexity and ambiguity)

    VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity, a combination of qualities that, taken together, characterize the nature of some difficult conditions and situations.

  • public relations (PR)

    Public relations (PR) is the use of communications to manage public perception of an individual or an organization. PR is ingrained in the culture of most larger enterprises.

  • fail fast

    Fail fast is a philosophy that values the development or implementation of many small experimental products, changes or approaches before committing large amounts of time or resources.

View All Project management Definitions Back to Top

SEO

Terms related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • semantic search

    Semantic search is an approach to locating information on the internet in which programming predicts context for a query. The goal of semantic search is to provide the end user with the most relevant search engine results possible.

  • migration

    In information technology (IT), migration is the process of moving from the use of one operating environment to another operating environment that is, in most cases, thought to be a better one.

  • search engine marketing (SEM)

    Search engine marketing (SEM) is an approach to advertising that helps companies' content rank higher in search engine queries.

View All SEO Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • Wi-Fi (802.11x standard)

    Wi-Fi is the popular term for high-frequency wireless local area network (WLAN) technology and a standard that has gained acceptance in many companies as an alternative to a wired LAN.

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all other applications from running.

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, malicious and accidental threats.

View All Security management Definitions Back to Top

Software management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.

  • Hewlett Packard Enterprise (HP Enterprise, HPE)

    Hewlett Packard Enterprise (HP Enterprise, also known as HPE) is an American multinational company that specializes in business IT (information technology).

  • Amazon EC2 (Elastic Compute Cloud)

    Amazon Elastic Compute Cloud is an Amazon Web Services cloud server hosting tool that allows a business to provision resources for public cloud IT projects.

View All Software management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

  • NVMe over FC (Nonvolatile Memory Express over Fibre Channel)

    Nonvolatile Memory Express over Fibre Channel enables NVMe-based message commands to transfer data between a host and storage subsystem over an FC network fabric.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close