Browse Definitions:

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • IBM Bluemix Local

    IBM Bluemix Local is a private version of the IBM Bluemix public cloud platform. Users deploy the IBM Bluemix Local platform on their own on-premises hardware, behind their firewall within their own data center.

  • fleet management software

    Fleet management software is an application that helps companies organize, manage and coordinate work vehicles from a central information system to keep the overall fleet operation running smoothly.

  • fleet management

    Fleet management is an administrative approach that allows companies to organize and coordinate work vehicles with the aim to improve efficiency, reduce costs, and provide compliance with government regulations.

View All Business software Definitions

Business terms

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • professional services

    Professional services, in the IT context, are services that a contractor or product vendor provides to help customers plan, design, implement and manage technology projects and systems.

  • paid prioritization

    Paid prioritization, in relation to the internet, is the optimization of data transfer rates for certain content providers, websites and web services.

  • bright-line rule

    A bright-line rule, also known as a bright-line test, is a directly-stated law or standard that is worded to avoid room for interpretation and also contains a break-down of objectives.

View All Business terms Definitions Back to Top

Compliance

Terms related to compliance, including regulatory definitions and words and phrases about governance and mitigating IT risk.

  • Open Internet Order of 2010

    The Open Internet Order of 2010 is a set of rules proposed by the United States Federal Communications Commission (FCC) with the purpose of maintaining an open and neutral internet that supports free speech and generally treats all traffic as equal.

  • National Highway Traffic Safety Administration (NHTSA)

    The National Highway Traffic Safety Administration (NHTSA) is a federal agency of the United States government tasked with upholding regulatory safety standards in automobile manufacturing and the highway transportation system.

  • commercial motor vehicle (CMV)

    A commercial motor vehicle (CMV) is any vehicle used to transport goods or passengers for the profit of an individual or business.

View All Compliance Definitions Back to Top

Customer relationship management

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • passenger name record (PNR)

    A passenger name record (PNR) is a collection of data pertaining to an individual air traveler or a group of individuals travelling together. Airlines use PNRs for management of customer data, security and customer valuation and may share that data with government agencies.

  • reality check

    A reality check is a second opinion, either requested or provided voluntarily, about the status of some current situation. Reality checks are a less formalized version of fact checking.

  • ad exchange

    An ad exchange is a software-based automated marketplace that allows publishers to sell their ad inventory and advertisers to bid on and purchase the inventory in real time.

View All Customer relationship management Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • vehicle to infrastructure (V2I or v2i)

    Vehicle-to-infrastructure (V2I or V2X) is a communication model that allows vehicles to share information with the components that support a country's highway system. Such components include overhead RFID readers and cameras, traffic lights, lane markers, streetlights, signage and parking meters. V2I communication is typically wireless and bi-directional: data from infrastructure components can be delivered to the vehicle and vice versa.

  • Centers for Disease Control and Prevention (CDC)

    Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

View All Healthcare IT Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • original equipment manufacturer (OEM)

    Original equipment manufacturer (OEM) is a broad term that describes a web of relationships among IT hardware vendors, component makers such as microprocessor manufacturers, software vendors, and channel partners such as resellers and distributors.

  • ERP (enterprise resource planning)

    Enterprise resource planning (ERP) is an industry term for the broad set of activities that help an organization manage its business.

  • ISV (independent software vendor)

    An ISV (independent software vendor) makes and sells software products that run on a physical hardware device, on a virtual machine or in the cloud.

View All IT procurement Definitions Back to Top

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • configuration management (CM)

    Configuration management is a governance and systems engineering process that ensures the proper accounting of an enterprise's configuration items and of the interrelationship between them in an operational environment.

  • managed file transfer (MFT)

    Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.

  • enterprise service bus (ESB)

    An enterprise service bus (ESB) is a middleware tool used to distribute work among connected components of an application.

View All Network administration Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • consultant (consulting)

    A consultant is an experienced individual in a given field who provides expert advice for a fee. Consultants typically work as independent contractors and are hired on a short-term basis. A consultant may also be an employee at a consulting firm.

  • reality check

    A reality check is a second opinion, either requested or provided voluntarily, about the status of some current situation. Reality checks are a less formalized version of fact checking.

  • adulting

    Adulting is the assumption of tasks and behaviors associated with normal grown-up life, along with the implication that the individual in question does not particularly identify as an adult.

View All Project management Definitions Back to Top

SEO

Terms related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • keyword (in SEO)

    A keyword is a term chosen to describe the content of a web page. The purpose is to improve the page’s search engine optimization (SEO) value, which determines its position on a search engine results page (SERP) and the likelihood that it will be found by users.

  • semantic search

    Semantic search is an approach to locating information on the internet in which programming predicts context for a query. The goal of semantic search is to provide the end user with the most relevant search engine results possible.

  • migration

    In information technology (IT), migration is the process of moving from the use of one operating environment to another operating environment that is, in most cases, thought to be a better one.

View All SEO Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • passenger name record (PNR)

    A passenger name record (PNR) is a collection of data pertaining to an individual air traveler or a group of individuals travelling together. Airlines use PNRs for management of customer data, security and customer valuation and may share that data with government agencies.

  • online data backup (remote data backup)

    Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a provider.

  • non-disclosure agreement (NDA)

    A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.

View All Security management Definitions Back to Top

Software management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • cloud bursting

    Cloud bursting is an application deployment model in which an application normally runs in a private cloud or local data center but can also run in a public cloud when the demand for computing capacity spikes.

  • DevOps as a Service

    DevOps as a Service (DaaS) is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team. In this delivery model, the DaaS provider collects the disparate tools that cover various aspects of the overall process and connects these tools to work together as one unit.

  • site reliability engineering (SRE)

    Site reliability engineering (SRE) is the application of scripting and automation to IT operations tasks such as maintenance and support. The goal of SRE is to swiftly fix bugs and remove manual work in rote tasks.

View All Software management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • online data backup (remote data backup)

    Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a provider.

  • ZFS

    ZFS is a local file system and logical volume manager created by Sun Microsystems to control the placement, storage and retrieval of data in enterprise computing systems.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • Web application firewall (WAF)

    A Web application firewall (WAF) is a firewall that monitors, filters or blocks traffic to and from a Web application. WAFs are ...

  • MD5

    The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • secondary storage

    Secondary storage is used to protect inactive data written from a primary storage array to a nonvolatile tier of disk, flash or ...

  • VRAM (video ram)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

  • ZFS

    ZFS is a local file system and logical volume manager created by Sun Microsystems to control the placement, storage and retrieval...

SearchSolidStateStorage

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close