Browse Definitions :

Data Center Management

Definitions used in data center management, including hardware, virtualization and cloud computing.

Compliance, risk and governance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • COBIT

    COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.

  • triple bottom line (TBL)

    The triple bottom line (TBL) is an accounting framework that includes social, environmental and financial results as bottom lines.

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

View All Compliance, risk and governance Definitions

Converged infrastructure

This WhatIs.com glossary contains definitions related to converged infrastructure and the integrated systems market.

  • What is IT/OT convergence? Everything you need to know

    IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.

  • technological convergence

    Technological convergence is a term that describes bringing previously unrelated technologies together, often in a single device.

  • Kubernetes

    Kubernetes, also referred to as K8s, is an open source system used to manage Linux Containers across private, public and hybrid cloud environments.

View All Converged infrastructure Definitions Back to Top

Data center management

Terms related to data centers, including definitions about network operations centers (NOCs) and words and phrases about the storage, management and the transmission of data.

View All Data center management Definitions Back to Top

Disaster recovery

This WhatIs.com glossary contains terms related to disaster recovery and business continuity.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process where a computer is restored to a new machine, typically after a catastrophic failure.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • recovery time objective (RTO)

    The recovery time objective (RTO) is the maximum tolerable length of time that a computer, system, network or application can be down after a failure or disaster occurs.

View All Disaster recovery Definitions Back to Top

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • CSO (Chief Security Officer)

    A Chief Security Officer (CSO) is a C-suite executive responsible for a company's physical and digital security.

  • core competency (core competencies)

    For any organization, its core competency refers to the capabilities, knowledge, skills and resources that constitute its 'defining strength.'

  • triple bottom line (TBL)

    The triple bottom line (TBL) is an accounting framework that includes social, environmental and financial results as bottom lines.

View All ERP Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.'

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

View All Government IT Definitions Back to Top

Hardware

Terms related to computer hardware, including definitions about cables, connectors and power supply units and words and phrases about computing peripheral devices including the keyboard, mouse, audio speakers, and printers.

  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process where a computer is restored to a new machine, typically after a catastrophic failure.

  • robotics

    Robotics is a branch of engineering that involves the conception, design, manufacture and operation of robots.

View All Hardware Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.

View All Healthcare IT Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • Avaya

    Avaya is an American technology company that specializes in business communications services, such as unified communications (UC) and contact center (CC).

  • e-procurement (supplier exchange)

    Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.

  • nonrepudiation

    Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information.

View All IT procurement Definitions Back to Top

Storage hardware

Terms related to storage hardware, including definitions about solid state drives and words and phrases about hard disk drives, tape drives, disk arrays and tiered storage.

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.

  • NAND flash memory

    NAND flash memory is a type of non-volatile storage technology that does not require power to retain data.

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system or a solid-state array, is an external storage array that uses only flash media for persistent storage.

View All Storage hardware Definitions Back to Top

Virtualization

Terms related to virtualization, including definitions about virtualization technologies and words and phrases about server virtualization, desktop virtualization and storage virtualization.

  • VPN (virtual private network)

    A virtual private network (VPN) is a service that creates a safe, encrypted online connection.

  • service mesh

    A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.

  • What is server sprawl and how to prevent it?

    Server sprawl is when multiple underutilized servers take up more space and consume more resources than can be justified by their workload.

View All Virtualization Definitions Back to Top
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • COBIT

    COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.

  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close