Browse Definitions:

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • validated learning

    Validated learning is an approach to demonstrating progress against business goals when traditional key performance indicators (KPIs) are not very useful.

  • channel conflict

    Channel conflict is a situation in which channel partners have to compete against one another or a vendor's internal sales department.

  • net income

    Net income is the amount of money left after all the expenses of a business have been subtracted from the gross revenue for a given reporting period, such as a fiscal quarter.

View All ERP Definitions

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • enterprise asset management (EAM)

    Enterprise asset management (EAM) is the process of managing the lifecycle of physical assets to maximize their use; save money; improve quality and efficiency; and safeguard health, safety and the environment.

  • performance management software

    Performance management software is designed to improve business performance by spurring employee productivity.

  • warehouse management system (WMS)

    A warehouse management system (WMS) is software and processes that allow organizations to control and administer warehouse operations from the time goods or materials enter a warehouse until they move out.

View All Business software Definitions Back to Top

Compliance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

View All Compliance Definitions Back to Top

CRM

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • voice recognition (speaker recognition)

    Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.

  • HubSpot

    HubSpot is a company that sells software designed for inbound marketing, including content management, search engine optimization and other tools.

  • behavioral economics

    Behavioral economics is the study of economic decision-making by individuals and institutions.

View All CRM Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.'

  • Americans with Disabilities Act (ADA) compliance

    Americans with Disabilities Act (ADA) compliance is the adherence to the standards put forth forth in the United States legislation.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • Epic Systems

    Epic Systems is one of the largest providers of health information technology, used primarily by large U.S. hospitals and health systems to access, organize, store and share electronic medical records.

  • accountable care organization (ACO)

    An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties voluntarily assume financial and medical responsibility for Medicare patients.

  • patient engagement

    Patient engagement is an ideal healthcare situation in which people are well-informed about -- and motivated to be involved -- in their own medical care.

View All Healthcare IT Definitions Back to Top

HR management

  • employee engagement software

    Employee engagement software helps workers feel more satisfied with their jobs and absorbed in the mission and culture of their organization, and, therefore, more productive and effective.

  • performance management software

    Performance management software is designed to improve business performance by spurring employee productivity.

  • employee life cycle

    Employee life cycle -- sometimes spelled as employee lifecycle -- is an HR model that identifies the different stages a worker advances through in an organization and the role HR plays in optimizing that progress.

View All HR management Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • managed service provider (MSP)

    A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.

  • Apple Authorized Service Provider (Apple AASP)

    An Apple Authorized Service Provider (AASP) is a business that provides repair services for Apple products.

  • business case

    A business case is a written or verbal value proposition that is intended to educate a decision maker and convince them to take some kind of action. When written, the document itself is sometimes referred to as a business case.

View All IT procurement Definitions Back to Top

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • Avro (Apache Avro)

    Apache Avro project is a row oriented object container storage format for Hadoop as well as a remote procedure call and data serialization framework.

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • network engineer

    A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.

View All Network administration Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • validated learning

    Validated learning is an approach to demonstrating progress against business goals when traditional key performance indicators (KPIs) are not very useful.

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks, costs and deadlines.

  • corporate culture model

    A corporate culture model is the organizing principle behind the values, beliefs and attitudes that characterize a company and guide its practices.clans and market-based models.

View All Project management Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • mobile application management (MAM)

    Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.

  • SAML (Security Assertion Markup Language)

    The Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and improving techniques for defeating or weakening them.

View All Security management Definitions Back to Top

SEO

Definitions related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • affiliate marketing

    Affiliate marketing is a performance-based marketing strategy in which one company pays another for referred business.

  • PageRank

    PageRank (PR) is Google’s main method of ranking web pages for placement on a search engine results page (SERP). PageRank refers to the system and the algorithmic method that Google uses to rank pages as well as the numerical value assigned to pages as a score.

  • nofollow

    Nofollow is a meta tag that can be added to a site’s robots.txt file or to individual links to stop search engine webcrawlers from following links on the page.

View All SEO Definitions Back to Top

Software management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • performance management software

    Performance management software is designed to improve business performance by spurring employee productivity.

  • predictive analytics

    Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast activity, behavior and trends.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work.

View All Software management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • LTO-8 (Linear Tape-Open 8)

    LTO-8 is a tape format from the Linear Tape-Open Consortium released in late 2017. It succeeded the LTO-7 version, which launched in 2015.

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained.

  • cloud storage service

    A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a network, usually the internet.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchSecurity

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

  • Trojan horse (computing)

    In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • cloud storage provider

    A cloud storage provider, also known as a managed service provider (MSP), is a company that offers organizations and individuals ...

  • personal cloud storage (PCS)

    Personal cloud storage (PCS) enables users to store data, photos, music, videos and other files on a local network-attached ...

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close