Browse Definitions :

Data Center Management

Definitions used in data center management, including hardware, virtualization and cloud computing.

Compliance, risk and governance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • cloud audit

    A cloud audit is a periodic examination an organization does to assess and document its cloud vendor's performance.

  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for risk management from the International Organization for Standardization.

  • data lifecycle management (DLM)

    Data lifecycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its lifecycle: from creation and initial storage to when it becomes obsolete and is deleted.

View All Compliance, risk and governance Definitions

Converged infrastructure

This WhatIs.com glossary contains definitions related to converged infrastructure and the integrated systems market.

  • What is IT/OT convergence? Everything you need to know

    IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.

  • technological convergence

    Technological convergence is a term that describes bringing previously unrelated technologies together, often in a single device.

  • Kubernetes

    Kubernetes, also referred to as K8s, is an open source system used to manage Linux Containers across private, public and hybrid cloud environments.

View All Converged infrastructure Definitions Back to Top

Data center management

Terms related to data centers, including definitions about network operations centers (NOCs) and words and phrases about the storage, management and the transmission of data.

  • data in motion

    Data in motion, also referred to as data in transit or data in flight, is a process in which digital information is transported between locations either within or between computer systems.

  • swap file (swap space or page file)

    A swap file is a system file that creates temporary storage space on a solid-state drive or hard disk when the system runs low on memory.

  • single point of failure (SPOF)

    A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system.

View All Data center management Definitions Back to Top

Disaster recovery

This WhatIs.com glossary contains terms related to disaster recovery and business continuity.

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so there are multiple, current copies of the data.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process where a computer is restored to a new machine, typically after a catastrophic failure.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

View All Disaster recovery Definitions Back to Top

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • Windows Server Update Services (WSUS)

    Windows Server Update Services (WSUS) is a Windows server role that can plan, manage and deploy updates, patches and hotfixes for Windows servers, client operating systems and other Microsoft software.

  • succession planning

    Succession planning is a process of developing talent to replace executive, leadership or other key employees when they transition to another role, leave the company, are fired, retire or die.

  • call center agent (call center representative)

    A call center agent is a person who handles incoming or outgoing customer calls for a business.

View All ERP Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • compliance

    Compliance is the state of being in accordance with established guidelines or specifications, or the process of becoming so.

  • COBOL (Common Business Oriented Language)

    COBOL (Common Business-Oriented Language) is a high-level programming language for business applications. It was the first popular language designed to be operating system-agnostic and is still in use in many financial and business applications today.

  • OpenStack

    OpenStack is a collection of open source software modules and tools that provide a framework to create and manage both public cloud and private cloud infrastructure.

View All Government IT Definitions Back to Top

Hardware

Terms related to computer hardware, including definitions about cables, connectors and power supply units and words and phrases about computing peripheral devices including the keyboard, mouse, audio speakers, and printers.

  • Preboot Execution Environment (PXE)

    The Preboot Execution Environment or PXE (commonly pronounced as pixie) is a client-server environment that enables network computers to boot over the network interface card (NIC), instead of from a CD-ROM or hard disk.

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical or silicon-based storage media.

  • motherboard tattoo

    A motherboard tattoo is a colloquial term once used to denote an ID code that is written in the basic input/output system (BIOS) of a computer to uniquely identify the computer.

View All Hardware Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • charge-coupled device

    A charge-coupled device (CCD) is a light-sensitive integrated circuit that captures images by converting photons to electrons.

  • compliance

    Compliance is the state of being in accordance with established guidelines or specifications, or the process of becoming so.

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

View All Healthcare IT Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • TCO (total cost of ownership)

    Total cost of ownership (TCO) is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment.

  • LOB (line of business)

    An LOB (line-of-business) application is one of the set of critical computer applications that are vital to running an enterprise, such as accounting, supply chain management, and resource planning applications.

  • software license

    A software license is a document that provides legally binding guidelines for the use and distribution of software.

View All IT procurement Definitions Back to Top

Storage hardware

Terms related to storage hardware, including definitions about solid state drives and words and phrases about hard disk drives, tape drives, disk arrays and tiered storage.

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical or silicon-based storage media.

  • IDE (Integrated Drive Electronics)

    IDE (Integrated Drive Electronics) is an electronic interface standard that defines the connection between a bus on a computer's motherboard and the computer's disk storage devices.

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage hierarchy.

View All Storage hardware Definitions Back to Top

Virtualization

Terms related to virtualization, including definitions about virtualization technologies and words and phrases about server virtualization, desktop virtualization and storage virtualization.

  • paravirtualization

    Paravirtualization is an enhancement of virtualization technology in which a guest OS is modified prior to installation inside a virtual machine (VM) in order to allow all guest OSes within the system to share resources and successfully collaborate, rather than attempt to emulate an entire hardware environment.

  • hardware virtualization

    Hardware virtualization, which is also known as server virtualization or simply virtualization, is the abstraction of computing resources from the software that uses those resources.

  • physical to virtual (P2V)

    Physical to virtual (P2V) is a term that refers to the migration of physical machines to virtual machines (VMs), also called hardware virtualization.

View All Virtualization Definitions Back to Top
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Twofish

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close