Browse Definitions :
Definition

Red Sox

The Boston Red Sox, champion of Major League baseball in 2004, are one of many sports teams for whom information technology has become an important if low-profile team member. For an owner, the use of IT may mean the difference between profit and loss; for the team manager, between a losing or a winning season. While computers have long been used in managing ticket sales and other aspects of stadium operation, the Red Sox are among teams that now use specialized software to assist in scouting and computerized video analysis of play and players. Baseball has always been supremely statistics-conscious; today, business intelligence software can be used to uncover strengths and weaknesses of opposing teams and players and to decide how much a team should be willing to pay a player.

Red Sox owners John Henry and Tom Werner may be representative of many IT-sophisticated team owners, but their special commitment to IT may have contributed to their team's success in 2004 (the Sox hadn't won the championship since 1918 and Boston fans, known for their ability to endure, were beginning to think it might be something only their children would live to see). Red Sox General Manager Theo Epstein reportedly became a fan of Sabermetrics, an approach to statistics that is said to evaluate players more effectively than the usual statistics (such as runs batted in). One software package the Red Sox use is ScoutAdvisor, which is said to be able "to slice and dice player data any way you ask." Similar software packages for analyzing the contributions or characteristics of corporate personnel are available.

This was last updated in October 2007

Continue Reading About Red Sox

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close