Browse Definitions:

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • corporate culture model

    A corporate culture model is the organizing principle behind the values, beliefs and attitudes that characterize a company and guide its practices.clans and market-based models.

  • time series chart

    A time series chart, also called a times series graph or time series plot, is a data visualization tool that illustrates data points at successive intervals of time.

  • CMO (chief marketing officer)

    A CMO (chief marketing officer) is a C-level corporate executive responsible for activities in an organization that have to do with creating, communicating and delivering offerings that have value for customers, clients or business partners.

View All ERP Definitions

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • corporate wellness technology

    Corporate wellness technology is software, and sometimes associated hardware, that human resources departments use to improve and manage workers' health and well-being.

  • robotic process automation

    Robotic process automation (RPA) is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required humans to perform.

  • talent management software (TM software)

    Talent management software is technology that human resource management professionals use to manage employees as a competitive advantage.

View All Business software Definitions Back to Top

Compliance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • container (disambiguation)

    This page explains how the term container is used in software development, storage, data center management and mobile device management.

  • Americans with Disabilities Act (ADA) compliance

    Americans with Disabilities Act (ADA) compliance is the adherence to the standards put forth forth in the United States legislation.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.

View All Compliance Definitions Back to Top

CRM

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • press kit

    A press kit is an information package provided for members of the media to promote events, organizations, products or candidates.

  • AI washing

    AI washing is a marketing effort designed to associate brands and products with artificial intelligence, even though the connection may be tenuous or non-existent.

  • virtual agent (intelligent virtual agent or virtual rep)

    A virtual agent (sometimes called an intelligent virtual agent, virtual rep or chatbot) is used to describe a program based in artificial intelligence (AI) that provides automated customer service.

View All CRM Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.'

  • Americans with Disabilities Act (ADA) compliance

    Americans with Disabilities Act (ADA) compliance is the adherence to the standards put forth forth in the United States legislation.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • accountable care organization (ACO)

    An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties voluntarily assume financial and medical responsibility for Medicare patients.

  • patient engagement

    Patient engagement is an ideal healthcare situation in which people are well-informed about -- and motivated to be involved -- in their own medical care.

  • robotic surgery (robot-assisted surgery)

    Robotic surgery is the use of computer technologies working in conjunction with robot systems to perform medical procedures.

View All Healthcare IT Definitions Back to Top

HR management

  • workforce planning

    Workforce planning is the strategy used by employers to anticipate labor needs and deploy workers most effectively, usually with advanced human resources technology.

  • corporate wellness technology

    Corporate wellness technology is software, and sometimes associated hardware, that human resources departments use to improve and manage workers' health and well-being.

  • talent management software (TM software)

    Talent management software is technology that human resource management professionals use to manage employees as a competitive advantage.

View All HR management Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • Apple Authorized Service Provider (Apple AASP)

    An Apple Authorized Service Provider (AASP) is a business that provides repair services for Apple products.

  • business case

    A business case is a written or verbal value proposition that is intended to educate a decision maker and convince them to take some kind of action. When written, the document itself is sometimes referred to as a business case.

  • Liquidware

    Liquidware is a company that provides monitoring and management software for physical, virtual and cloud desktop deployments.

View All IT procurement Definitions Back to Top

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • intent-based networking (IBN)

    Intent-based networking (IBN) is a developing area of technology incorporating machine learning and artificial intelligence (AI) to automate administrative tasks across a network.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.

  • private cloud (internal cloud or corporate cloud)

    Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.

View All Network administration Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • corporate culture model

    A corporate culture model is the organizing principle behind the values, beliefs and attitudes that characterize a company and guide its practices.clans and market-based models.

  • block diagram

    A block diagram is a visual representation of a system that uses simple, labeled blocks that represent single or multiple items, entities or concepts, connected by lines to show relationships between them.

  • zero-sum game

    A zero-sum game is a situation in which the potential gain for players remains constant. No augmentation or loss can occur and the gain is distributed between the competitors.

View All Project management Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.

  • facial recognition

    Facial recognition (or face recognition) is a type of biometric software application that can identify a specific individual in a digital image by analyzing and comparing patterns.

  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security. 

View All Security management Definitions Back to Top

SEO

Definitions related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • affiliate marketing

    Affiliate marketing is a performance-based marketing strategy in which one company pays another for referred business.

  • PageRank

    PageRank (PR) is Google’s main method of ranking web pages for placement on a search engine results page (SERP). PageRank refers to the system and the algorithmic method that Google uses to rank pages as well as the numerical value assigned to pages as a score.

  • nofollow

    Nofollow is a meta tag that can be added to a site’s robots.txt file or to individual links to stop search engine webcrawlers from following links on the page.

View All SEO Definitions Back to Top

Software management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work.

  • private cloud (internal cloud or corporate cloud)

    Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.

  • alarm management

    Alarm management is a system for prioritizing, grouping and classifying alerts and event notifications used in supervisory control and data acquisition (SCADA). Alarm management functions similarly in other applications such as IT and medical care.

View All Software management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • NVMe over Fibre Channel (NVMe over FC) or FC-NVMe standard

    Nonvolatile memory express over Fibre Channel (NVMe over FC) -- which is implemented through the Fibre Channel-NVMe (FC-NVMe) standard -- is a technology specification designed to enable NVMe-based message commands to transfer data and status information between a host computer and a target storage subsystem over a Fibre Channel network fabric.

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics (NVMe-oF) is a technology specification designed to enable nonvolatile memory express message-based commands to transfer data between a host computer and a target solid-state storage device or system over a network, such as Ethernet, Fibre Channel (FC) or InfiniBand.

  • parallel file system

    A parallel file system is a software component designed to store data across multiple networked servers and to facilitate high-performance access through simultaneous, coordinated input/output operations (IOPS) between clients and storage nodes.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of ...

  • polymorphic virus

    A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to ...

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against ...

SearchHealthIT

  • accountable care organization (ACO)

    An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties ...

  • patient engagement

    Patient engagement is an ideal healthcare situation in which people are well-informed about -- and motivated to be involved -- in...

  • personal health record (PHR)

    A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual ...

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close