Browse Definitions :

Data Center Management

Definitions used in data center management, including hardware, virtualization and cloud computing.

Compliance, risk and governance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • protected health information (PHI) or personal health information

    Protected health information (PHI), also referred to as personal health information, is the demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.

View All Compliance, risk and governance Definitions

Converged infrastructure

This WhatIs.com glossary contains definitions related to converged infrastructure and the integrated systems market.

  • Kubernetes

    Kubernetes, also referred to as K8s, is an open source system used to manage Linux Containers across private, public and hybrid cloud environments.

  • data center capacity planning

    Data center capacity planning ensures that an IT organization has enough facility space, power and computing resources to support average and peak workloads.

  • What is hyper-converged infrastructure? Guide to HCI

    Hyper-converged infrastructure is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

View All Converged infrastructure Definitions Back to Top

Data center management

Terms related to data centers, including definitions about network operations centers (NOCs) and words and phrases about the storage, management and the transmission of data.

  • Kubernetes

    Kubernetes, also referred to as K8s, is an open source system used to manage Linux Containers across private, public and hybrid cloud environments.

  • virtualization sprawl (VM sprawl)

    Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where administrators can no longer manage them effectively.

  • database management system (DBMS)

    A database management system (DBMS) is system software for creating and managing databases. A DBMS makes it possible for end users to create, protect, read, update and delete data in a database.

View All Data center management Definitions Back to Top

Disaster recovery

This WhatIs.com glossary contains terms related to disaster recovery and business continuity.

View All Disaster recovery Definitions Back to Top

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • transformational leadership

    Transformational leadership is a management philosophy that encourages and inspires employees to innovate and develop new ways to grow and improve the path to a company's future success.

  • cloud service provider (cloud provider)

    A cloud service provider, or CSP, is a company that offers some component of cloud computing -- typically, infrastructure as a service (IaaS), software as a service (SaaS) or platform as a service (PaaS).

  • inventory management

    Inventory management is the supervision of noncapitalized assets -- or inventory -- and stock items.

View All ERP Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or government entity.

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Federal Information Security Management Act (FISMA)

    The Federal Information Security Management Act (FISMA) is United States legislation that defines a framework of guidelines and security standards to protect government information, operations and assets.

View All Government IT Definitions Back to Top

Hardware

Terms related to computer hardware, including definitions about cables, connectors and power supply units and words and phrases about computing peripheral devices including the keyboard, mouse, audio speakers, and printers.

  • MIMO (multiple input, multiple output)

    MIMO (multiple input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver).

  • What is server virtualization? The ultimate guide

    Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

View All Hardware Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • protected health information (PHI) or personal health information

    Protected health information (PHI), also referred to as personal health information, is the demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.

  • digital health (digital healthcare)

    Digital health, or digital healthcare, is a broad, multidisciplinary concept that includes concepts from an intersection between technology and healthcare.

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

View All Healthcare IT Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • IT4IT

    IT4IT is a reference architecture for information technology (IT) management. IT organizations and tool vendors use IT4IT as a framework to improve and guide IT capabilities by focusing on value chains.

  • IT4IT Foundation certification

    IT4IT Foundation is a certification for the IT4IT reference architecture.

  • value chain

    A value chain is a concept describing the full chain of a business's activities in the creation of a product or service -- from the initial reception of materials all the way through its delivery to market, and everything in between.

View All IT procurement Definitions Back to Top

Storage hardware

Terms related to storage hardware, including definitions about solid state drives and words and phrases about hard disk drives, tape drives, disk arrays and tiered storage.

  • CDMA (Code-Division Multiple Access)

    CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications.

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • What is an M.2 SSD?

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

View All Storage hardware Definitions Back to Top

Virtualization

Terms related to virtualization, including definitions about virtualization technologies and words and phrases about server virtualization, desktop virtualization and storage virtualization.

  • virtualization sprawl (VM sprawl)

    Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where administrators can no longer manage them effectively.

  • virtual machine (VM)

    A virtual machine (VM) is an operating system (OS) or application environment that is installed on software, which imitates dedicated hardware.

  • What is server virtualization? The ultimate guide

    Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.

View All Virtualization Definitions Back to Top

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • PKI (public key infrastructure)

    PKI (public key infrastructure) is the underlying framework that enables entities -- users and servers -- to securely exchange ...

  • obfuscation

    Obfuscation means to make something difficult to understand.

  • dumpster diving

    Dumpster diving is looking for treasure in someone else's trash.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close