Browse Definitions :

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • natural language processing (NLP)

    Natural language processing (NLP) is the ability of a computer program to understand human language as it is spoken.

  • Hadoop

    Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems.

  • NetSuite

    NetSuite is a business technology vendor based in San Mateo, California.

View All Business software Definitions

Career paths and IT certifications

  • citizen data scientist

    A citizen data scientist is any individual who contributes to the research of a complex data initiative but who does not have a formal educational background in data analytics (DA) or business intelligence (BI).

  • full-stack developer

    A full-stack developer is a type of programmer that has a functional knowledge of all techniques, languages and systems engineering concepts required in software development.

  • data center administrator (DCA)

    A data center administrator monitors systems, installs equipment and cabling, and participates in change processes and everyday procedures that support information technology.

View All Career paths and IT certifications Definitions Back to Top

Compliance, risk and governance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.

  • times interest earned (TIE)

    Times interest earned (TIE) is a metric used to measure a company’s manageable debt limits; by its ability to pay the monthly interest on it’s debts. TIE is used to determine a given company’s ability to pay its obligations to debtors.

  • supply chain security

    Supply chain security is the part of supply chain management (SCM) that focuses on minimizing risk for supply chain, logistics and transportation management systems (TMS).

View All Compliance, risk and governance Definitions Back to Top

CRM

The goal of customer experience management (CEM) is to optimize customer satisfaction at each touchpoint of the customer journey. Definitions in this glossary include terms about marketing and creating a customer-centric view of business, the use of AI and RPA in martech, capturing and analyzing customer feedback and contact center automation.

  • market basket analysis

    Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing patterns.

  • live chat (live support)

    Live chat (live support) provides the means to engage with users, as they’re actively visiting an organization’s owned media properties. Live chat is also used by existing customers, who can present questions that need answers or issues that need resolution.

  • LinkedIn Sales Navigator

    LinkedIn Sales Navigator provides features for sales professionals to identify prospects, receive alerts on prospects' activities on LinkedIn and request introductions to prospects through shared connections.

View All CRM Definitions Back to Top

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.

  • Data as a Service (DaaS)

    Data as a Service (DaaS) is an information provision and distribution model in which data files (including text, images, sounds, and videos) are made available to customers over a network, typically the Internet.

  • emotional intelligence (EI)

    Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior. The term was popularized in 1995 by psychologist and behavioral scientist Dr. Daniel Goleman. According to Goleman, emotional intelligence is the largest single predictor of success in the workplace.

View All ERP Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.

  • USA Patriot Act

    The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks.

  • think tank

    A think tank is an organization that gathers a group of interdisciplinary scholars to perform research around particular policies, issues or ideas.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.

  • Regional Health Information Organization (RHIO)

    A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.

  • motion analysis

    Motion analysis is a measuring technique used in computer vision, image processing and high-speed photography applications to detect movement.

View All Healthcare IT Definitions Back to Top

HR management

  • human resource management (HRM)

    Human resource management (HRM) is the practice of recruiting, hiring, deploying and managing an organization's employees.

  • Maslow’s hierarchy of needs

    Maslow’s hierarchy of needs is a charted set of human requirements that are important for an individual to achieve complete development and self-actualization.

  • intranet

    An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences.

View All HR management Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.

  • service level indicator

    A service level indicator (SLI) is a carefully defined measure of performance within a provided service that is given to a customer by the vendor.

  • statement of work (SOW)

    A statement of work (SOW), in project management, is a document in which a contracting officer or chief procurement officer (CPO) specifies the objectives and deliverables for a particular project or service contract.

View All IT procurement Definitions Back to Top

Network management

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.

  • Uptime Institute’s data center tier standards

    The Uptime Institute’s data center tier standards are a standardized methodology used to determine availability in a facility.

  • Group Policy

    Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers. Group policy is primarily a security tool, and can be used to apply security settings to users and computers.

View All Network management Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • state diagram (state machine diagram or statechart diagram)

    A state diagram, also known as a state machine diagram or statechart diagram, is an illustration of the states an object can attain as well as the transitions between those states in the Unified Modeling Language (UML).

  • vision statement

    A vision statement is an organization's declaration of its mid-term and long-term goals, stating what they want to become in the future. Vision statements act as a goal for a company to strive toward.

  • think tank

    A think tank is an organization that gathers a group of interdisciplinary scholars to perform research around particular policies, issues or ideas.

View All Project management Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • threat ignorance

    Threat ignorance is a concept used by security professionals to determine the level of vulnerability a company or user’s computer or system has to an attack.

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • identity and access management (IAM)

    Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.

View All Security management Definitions Back to Top

SEO

Definitions related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • microdata

    Microdata is a type of specification language that is embedded within HTML content to improve machine readability, annotate elements and analyze web pages.

  • Click to Tweet

    Click to Tweet is a website that automatically generates links for users to share content through their own Twitter accounts.

  • Google My Business

    Google My Business is a free online business listing service that is integrated with the Google search engine.

View All SEO Definitions Back to Top

Software asset management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • Hadoop

    Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems.

  • shift-right testing

    Shift-right testing is a method of continuously testing software while it is in a post-production environment.

  • open core model (open core software)

    The open core model is a business strategy where a company offers a “core” version of a product with limited features as free and open source (FOSS) software at the same time an add-on commercial version is released as proprietary software.

View All Software asset management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • data center as a service (DCaaS)

    A data center as a service (DCaaS) provider will supply turnkey physical data center facilities and computing infrastructure (e.g., servers, networking, storage, and so on) to clients in the form of a service.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.

  • Storage vMotion

    Storage vMotion is a component of VMware vSphere that allows the live migration of a running virtual machine's (VM) file system from one storage system to another, with no downtime for the VM or service disruption for end users.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close