Browse Definitions:

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

  • managed file transfer (MFT)

    Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.

  • real-time bidding (RTB)

    Real-time bidding (RTB) is an automated auction process for the purchase of ad impressions on websites. RTB is an integral component of programmatic advertising, which automates the processes and transactions involved in buying and placing ads.

View All Business software Definitions

Business terms

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • Total Quality Management (TQM)

    Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.

  • Share of wallet (SOW) or wallet share

    Share of wallet (SOW) is a marketing metric used to calculate the percentage of a customer's spending for a type of product or service that goes to a particular company.

  • bandwagon effect

    The bandwagon effect is a psychological phenomenon whereby people do something mostly because others are doing it, often ignoring their personal principles or underlying evidence.

View All Business terms Definitions Back to Top

Compliance

Terms related to compliance, including regulatory definitions and words and phrases about governance and mitigating IT risk.

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

  • managed file transfer (MFT)

    Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.

View All Compliance Definitions Back to Top

Customer relationship management

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • ad exchange

    An ad exchange is a software-based automated marketplace that allows publishers to sell their ad inventory and advertisers to bid on and purchase the inventory in real time.

  • demand-side platform (DSP)

    A demand-side platform (DSP) is software that allows an advertiser to buy inventory from ad exchanges and manage advertising campaigns.

  • ad inventory (advertising inventory)

    Ad inventory is the total amount of space that a publisher has available for advertisements at any given time.

View All Customer relationship management Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.

  • cybersecurity

    Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

  • FRCP Rule 41

    FRPC Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

View All Healthcare IT Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • original equipment manufacturer (OEM)

    Original equipment manufacturer (OEM) is a broad term that describes a web of relationships among IT hardware vendors, component makers such as microprocessor manufacturers, software vendors, and channel partners such as resellers and distributors.

  • ERP (enterprise resource planning)

    Enterprise resource planning (ERP) is an industry term for the broad set of activities that help an organization manage its business.

  • ISV (independent software vendor)

    An ISV (independent software vendor) makes and sells software products that run on a physical hardware device, on a virtual machine or in the cloud.

View All IT procurement Definitions Back to Top

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • configuration management (CM)

    Configuration management is a governance and systems engineering process that ensures the proper accounting of an enterprise's configuration items and of the interrelationship between them in an operational environment.

  • managed file transfer (MFT)

    Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.

  • enterprise service bus (ESB)

    An enterprise service bus (ESB) is a middleware tool used to distribute work among connected components of an application.

View All Network administration Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • adulting

    Adulting is the assumption of tasks and behaviors associated with normal grown-up life, along with the implication that the individual in question does not particularly identify as an adult.

  • ad inventory (advertising inventory)

    Ad inventory is the total amount of space that a publisher has available for advertisements at any given time.

  • ad network

    An ad network (advertising network) is an intermediary company that acts as a broker between advertisers who want to purchase inventory and publishers who want to host ads.

View All Project management Definitions Back to Top

SEO

Terms related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • keyword (in SEO)

    A keyword is a term chosen to describe the content of a web page. The purpose is to improve the page’s search engine optimization (SEO) value, which determines its position on a search engine results page (SERP) and the likelihood that it will be found by users.

  • semantic search

    Semantic search is an approach to locating information on the internet in which programming predicts context for a query. The goal of semantic search is to provide the end user with the most relevant search engine results possible.

  • migration

    In information technology (IT), migration is the process of moving from the use of one operating environment to another operating environment that is, in most cases, thought to be a better one.

View All SEO Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.

  • managed file transfer (MFT)

    Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.

View All Security management Definitions Back to Top

Software management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

  • enterprise service bus (ESB)

    An enterprise service bus (ESB) is a middleware tool used to distribute work among connected components of an application.

  • Microsoft Windows 10 Long Term Servicing Branch

    Microsoft Windows 10 Long Term Servicing Branch is a licensing structure available for operating system updates in Windows 10 Enterprise.

View All Software management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

  • managed file transfer (MFT)

    Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store multiple petabytes of data.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close