Browse Definitions :

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • property management system (PMS)

    A property management system (PMS) is a software application for the operations of hotels, other hospitality accommodations and commercial residential rental properties.

  • Fieldglass

    SAP Fieldglass is a cloud-based software platform that allows companies to manage external workforces, including contractors, temporary workers, contingent labor, and statement of work (SOW) employees.

  • continuous integration (CI)

    Continuous integration (CI) is a software engineering practice in which frequent, isolated changes are immediately tested and reported on when they are added to a larger code base.

View All Business software Definitions

Compliance, risk and governance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • freedom of expression

    Freedom of expression is the right of individuals and organizations to exchange information without fear of repercussion or censorship.

  • First Amendment to the Constitution

    The First Amendment to the United States Constitution is one of a group of ten additions to the original document that provided a framework for law within the country.

  • chilling effect

    The chilling effect is the suppression of free speech and legitimate forms of dissent among a population because of fear of repercussion.

View All Compliance, risk and governance Definitions Back to Top

CRM

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • mindshare (share of mind)

    Mindshare, also known as share of mind, is an approach to marketing that involves attempting to make a company, brand or product the first one that comes to mind when a customer thinks of a particular market.

  • acceptable spam report rate

    An acceptable spam report rate is a metric set for how many of a company's marketing or status emails are reported as spam, also known as "junk mail," or unsolicited bulk messages sent through email.

  • Cold Calling

    Cold calling is the business practice of reaching out to a potential customer or client who has not opted into a contact list with the desire to generate a sale or secure support.

View All CRM Definitions Back to Top

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • days inventory outstanding (DIO)

    Days inventory outstanding (DOI) is the average number of days it takes for inventory to be sold. DOI is also known as inventory days of supply or days in inventory.

  • actionable intelligence

    Actionable intelligence is information that can be followed up on, with the further implication that a strategic plan should be undertaken to make positive use of the information gathered.

  • content services platform

    A content services platform is cloud-based SaaS software that enables users to create, share, collaborate on and store text, audio and video content.

View All ERP Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • Department of Space (India)

    The Department of Space (DoS) is a department created by the Indian government to manage their space program and oversee a number of related agencies and institutes.

  • Space Force (United States Space Force)

    Space Force is a proposed branch of the United States Armed Forces. In June 2018, President Trump announced plans for a Space Force to complement the Army, Navy, Air Force, Marines and Coast Guard and defend the United States and its orbital assets from attack.

  • G-Cloud (Government Cloud)

    Government Cloud, also referred to as G-Cloud, is a U.K. government program to promote government-wide adoption of cloud computing.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • smart bandage

    A smart bandage is a wound dressing with added technology to sense wound healing progress, dispense medication and upload progress-related data.

  • ICD-10 (International Classification of Diseases, Tenth Revision)

    The International Classification of Diseases, Tenth Edition (ICD-10), is a clinical cataloging system that went into effect for the U.S. healthcare industry on Oct. 1, 2015, after a series of lengthy delays.

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the telecommunications infrastructure.

View All Healthcare IT Definitions Back to Top

HR management

  • employee onboarding and offboarding

    Employee onboarding and offboarding are two core HR activities that are gaining in importance.

  • 360 review

    A 360 review, or 360-degree review, is a feedback collection process aimed at helping employees at all levels obtain responses from various parts of an organization in order to develop and sharpen their professional skills.

  • FIRE (Financial Independence, Retire Early)

    FIRE (Financial Independence, Retire Early) is a lifestyle, also referred to as a movement, aimed at reducing expenditures and increasing investing in order to quickly gain financial independence and the possibility of retirement at an early age.

View All HR management Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • procure to pay (P2P)

    Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.

  • Alibaba Holding Group Limited

    Alibaba Group Holding Limited is a Chinese business conglomerate that runs the world’s largest retailer and one of the largest online e-commerce sites in the world, Alibaba.com.

  • automotive IT

    Automotive IT is any hardware or software designed to augment and support the experience of operating a motor vehicle.

View All IT procurement Definitions Back to Top

Network management

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • network analytics

    Network analytics is the application of big data principles and tools to the management and security of data networks.

  • performance testing

    Performance testing is the process of determining the speed, responsiveness and stability of a computer, network, software program or device under a workload.

  • log analytics

    Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.

View All Network management Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • terminology management

    Terminology management is the systematized collection of concepts and terms with the purpose of unifying and standardizing technical documentation.

  • actionable intelligence

    Actionable intelligence is information that can be followed up on, with the further implication that a strategic plan should be undertaken to make positive use of the information gathered.

  • continuous integration (CI)

    Continuous integration (CI) is a software engineering practice in which frequent, isolated changes are immediately tested and reported on when they are added to a larger code base.

View All Project management Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.

  • cryptography

    Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.

  • employee onboarding and offboarding

    Employee onboarding and offboarding are two core HR activities that are gaining in importance.

View All Security management Definitions Back to Top

SEO

Definitions related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • search engine

    A search engine is a program that gathers information (web pages) in a database and provides relevant results to user keyword queries.

  • voice SEO

    Voice SEO is the optimization of keywords and keyword phrases for searches through voice assistants.

  • listicle

    A listicle is an index whose point items are supplemented with additional related commentary. The term is a portmanteau of the words list and article.

View All SEO Definitions Back to Top

Software asset management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • application

    An application, also referred to as an application program or application software, is a computer software package that performs a specific function directly for an end user or, in some cases, for another application.

  • log analytics

    Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.

  • 12 factor app (twelve-factor app)

    Twelve-factor app is a methodology for building distributed applications that run in the cloud and are delivered as a service. The approach was developed by Adam Wiggins, the co-founder of Heroku, a platform-as-a-service which is now part of Salesforce.com.

View All Software asset management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and storage capacity.

  • RAID 0 (disk striping)

    RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple storage devices, such as hard disks or solid-state drives (SSDs), in a redundant array of independent disks (RAID) group.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close