Browse Definitions:

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • channel partner

    A channel partner is a person or organization that provides services or sells products on behalf of a software, hardware, networking or cloud services vendor. Value-added resellers (VARs), systems integrators (SIs), consultants, managed service providers (MSPs), original equipment manufacturers (OEMs), distributors and independent software vendors (ISVs) may all be called channel partners.

  • people analytics (HR analytics)

    People analytics is the application of math, statistics and modeling to worker-related data to see and predict patterns.

  • inventory management

    Inventory management is the supervision of non-capitalized assets (inventory) and stock items.

View All ERP Definitions

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • inventory management

    Inventory management is the supervision of non-capitalized assets (inventory) and stock items.

  • Windows Server Core

    Windows Server Core is a minimal installation option for the Windows Server operating system (OS) that has no GUI and only includes the components required to perform server roles and run applications.

  • IQMS

    IQMS introduced one of its newest services, WebIQ, in August 2016. WebIQ runs on HTML5 and JavaScript and essentially recreates EnterpriseIQ's user interface, allowing users to access EnterpriseIQ anywhere on any device, the vendor claims.

View All Business software Definitions Back to Top

Compliance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • Data Protection Bill 2017

    The Data Protection Bill 2017 is legislation that will replace the Data Protection Act of 1998. It is designed to balance the privacy needs of United Kingdom (UK) and European Union (EU) citizens with the interests of business.

  • ONC (Office of the National Coordinator for Health Information Technology)

    The Office of the National Coordinator for Health Information Technology, abbreviated ONC, is an entity within the U.S. Department of Health and Human Services (HHS).

  • Deferred Action for Childhood Arrivals (DACA)

    Deferred Action for Childhood Arrivals (DACA) is a program run by the United States Department of Homeland Security which allowed specific illegal immigrants who came to the country as children, known as Dreamers, to defer removal action for two years, a time period which could then be renewed.

View All Compliance Definitions Back to Top

CRM

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • contact center

    A contact center -- also referred to as a customer interaction center or e-contact center -- is a central point from which all customer contacts are managed.

  • surprise and delight

    Surprise and delight is a marketing approach that seeks to attract and nurture customers by enhancing interactions with them and offering them unexpected rewards.

  • charm offensive

    A charm offensive is an intense and carefully plotted campaign to win over someone who may not be favorably disposed toward the campaigner.

View All CRM Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • Driver's Privacy Protection Act (DPPA)

    The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personal information of licensed drivers from improper use or disclosure.

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another nation-state.

  • gross domestic product (GDP)

    Gross domestic product (GDP) is the total amount of dollars made within a given location in the selling of all goods and services before deductions.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

View All Healthcare IT Definitions Back to Top

HR management

  • people analytics (HR analytics)

    People analytics is the application of math, statistics and modeling to worker-related data to see and predict patterns.

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that means the basic functions of an HR department; the basic data captured about employees; and the software used to manage basic HR processes.

  • activity-based management (ABM)

    Activity-based management is a management strategy in which business processes are evaluated and adjusted for their cost efficiency using activity-based costing.

View All HR management Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • authorized service provider (ASP)

    An authorized service provider (ASP) is an organization that a product manufacturer has deemed qualified to service products covered under the manufacturer's warranty.

  • VAR (value-added reseller)

    A VAR, or value-added reseller, is a company that resells software, hardware and networking products and provides value beyond order fulfillment.

  • statement of work (SOW)

    A statement of work (SOW), in project management, is a document in which a contracting officer or chief procurement officer (CPO) specifies the objectives and deliverables for a particular project or service contract.

View All IT procurement Definitions Back to Top

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • network automation

    Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.

  • Platform as a Service (PaaS)

    Platform as a service (PaaS) is a cloud computing model in which a third-party provider delivers hardware and software tools -- usually those needed for application development -- to users over the internet.

  • application delivery controller

    An application delivery controller (ADC) is a network component that manages and optimizes how client machines connect to web and enterprise application servers.

View All Network administration Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • life-cycle cost analysis (LCCA)

    Life-cycle cost analysis (LCCA) is the study of all the costs associated with processes, materials and goods from acquisition to ownership and maintenance, through to and including disposal.

  • corporate business glossary

    A corporate business glossary is a collection of terms commonly used within a business, along with their standard definitions specific to industry and the organization.

  • CALMS

    CALMS is a conceptual framework for the integration of development and operations (DevOps) teams, functions and systems within an organization.

View All Project management Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.

  • vulnerability disclosure

    Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that stipulates guidelines for doing so.

  • cyber attribution

    Cyber attribution is the process of tracking, identifying and laying blame on the perpetrator of a cyberattack or other hacking exploit.

View All Security management Definitions Back to Top

SEO

Definitions related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • affiliate marketing

    Affiliate marketing is a performance-based marketing strategy in which one company pays another for referred business.

  • PageRank

    PageRank (PR) is Google’s main method of ranking web pages for placement on a search engine results page (SERP). PageRank refers to the system and the algorithmic method that Google uses to rank pages as well as the numerical value assigned to pages as a score.

  • nofollow

    Nofollow is a meta tag that can be added to a site’s robots.txt file or to individual links to stop search engine webcrawlers from following links on the page.

View All SEO Definitions Back to Top

Software management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • Platform as a Service (PaaS)

    Platform as a service (PaaS) is a cloud computing model in which a third-party provider delivers hardware and software tools -- usually those needed for application development -- to users over the internet.

  • app virtualization (application virtualization)

    App virtualization (application virtualization) is the separation of an installation of an application from the client computer that is accessing it.

  • enterprise content management (ECM)

    Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.

View All Software management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • TLC flash (triple-level cell flash)

    TLC flash (triple-level cell flash) is a type of NAND flash memory that stores three bits of data per cell.

  • hyper-converged storage

    Hyper-converged storage is a technology that combines storage, compute, networking and virtualization technologies in one physical unit that is managed as a single system.

  • copy data management (CDM)

    Copy data management (CDM) is an approach to reducing storage consumption that involves eliminating the unnecessary duplication of production data.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • vulnerability disclosure

    Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • NOR flash memory

    NOR flash memory is one of two types of nonvolatile storage technologies.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close