Browse Definitions :

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • Apache OpenWhisk

    Apache OpenWhisk is an open source and serverless cloud platform that performs functions in response to events.

  • SAP

    SAP SE is a multinational software corporation that is currently the market leader in the enterprise resource planning (ERP) field.

  • Tyk

    Tyk is an open source application program interface (API) gateway management tool.

View All Business software Definitions

Career paths and IT certifications

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected; the certification is presented after completion of a comprehensive testing and application process.

  • tech ethicist

    Tech ethicist is a corporate role that involves examining a company’s technologies to ensure that they meet ethical standards, that they do not exploit user vulnerabilities, for example, or infringe upon user rights.

  • microwork (microtask)

    Microwork is any microtask that has been outsourced to a decentralized, online workforce. A microtask is a small job that requires a low level of skill and takes minimal time to complete.

View All Career paths and IT certifications Definitions Back to Top

Compliance, risk and governance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected; the certification is presented after completion of a comprehensive testing and application process.

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • relationship marketing

    Relationship marketing is a customer relationship management strategy designed to encourage strong, lasting customer connections to a brand. The goal is to generate repeat sales, encourage word-of-mouth promotion and gather customer information.

View All Compliance, risk and governance Definitions Back to Top

CRM

The goal of customer experience management (CEM) is to optimize customer satisfaction at each touchpoint of the customer journey. Definitions in this glossary include terms about marketing and creating a customer-centric view of business, the use of AI and RPA in martech, capturing and analyzing customer feedback and contact center automation.

  • Acxiom

    Acxiom is an identity based marketing company and data broker that specializes in personalized marketing.

  • subscription management

    Subscription management is the process of overseeing and controlling all aspects of products and services sold repeatedly through a weekly, monthly, quarterly or yearly subscription-based pricing model.

  • social currency

    Social currency is the personal assets and attributes of an individual that help them succeed in interactive social channels.

View All CRM Definitions Back to Top

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • order to cash (OTC or O2C)

    Order to cash (OTC or O2C) is a set of business processes that involve receiving and fulfilling customer requests for goods or services.

  • spiral model

    The spiral model is a systems development lifecycle (SDLC) method used for risk management that combines the iterative development process model with elements of the waterfall model.

  • people analytics (HR analytics)

    People analytics, also known as human resource (HR) analytics and talent analytics, is a form of big data that applies math, statistics and modeling to worker-related data to see and predict patterns.

View All ERP Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • Federal Deposit Insurance Corporation (FDIC)

    The Federal Deposit Insurance Corporation (FDIC) is an independent agency of the United States (U.S.) federal government that preserves public confidence in the banking system by insuring deposits... (Continued)

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another nation-state.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.

  • Regional Health Information Organization (RHIO)

    A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.

View All Healthcare IT Definitions Back to Top

HR management

  • people analytics (HR analytics)

    People analytics, also known as human resource (HR) analytics and talent analytics, is a form of big data that applies math, statistics and modeling to worker-related data to see and predict patterns.

  • off-hours communications

    Off-hours communications are work-related emails, texts, phone calls, social media messaging and other communications that are transmitted when an employee is not officially working.

  • right to disconnect

    Right to disconnect legislation is a body of regulations limiting the time that employers can expect employees to be available for work-related off-hours communications.

View All HR management Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • supply chain management (SCM)

    Supply chain management (SCM) is the broad range of activities required to plan, control and execute a product's flow, from acquiring raw materials and production through distribution to the final customer, in the most streamlined and cost-effective way possible.

  • digital workspace

    A digital workspace is an integrated technology framework that centralizes the management of applications, data and endpoints and provides users with self-service, out-of-the-box experiences that scale across platforms, locations and device ownership models.

  • managed service provider (MSP)

    A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.

View All IT procurement Definitions Back to Top

Network management

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • Nginx

    Nginx (pronounced engine x) is open source webserver software that also performs reverse proxy, load balancing, email proxy and HTTP cache services.

  • private certificate authority (CA)

    Private CA stands for private certificate authority and is an enterprise specific certificate authority that functions like a publicly trusted CA but is exclusively run by or for the enterprise.

  • device as a service

    Device as a service is the offering of PCs, smart phones and other mobile compute devices as a paid service.

View All Network management Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • continuous innovation

    Continuous innovation is an iterative process of incorporating both modest, incremental and radical revolutionary improvements in processes, product designs, services and technologies.

  • Mandela Effect

    The Mandela Effect is an observed phenomenon in which a large segment of the population misremembers a significant event or shares a memory of an event that did not actually occur.

  • DevOps

    In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable. In its most narrow interpretation, DevOps describes the part of an organization’s information technology (IT) team that creates and maintains infrastructure.

View All Project management Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected; the certification is presented after completion of a comprehensive testing and application process.

  • private certificate authority (CA)

    Private CA stands for private certificate authority and is an enterprise specific certificate authority that functions like a publicly trusted CA but is exclusively run by or for the enterprise.

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

View All Security management Definitions Back to Top

SEO

Definitions related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • microdata

    Microdata is a type of specification language that is embedded within HTML content to improve machine readability, annotate elements and analyze web pages.

  • Click to Tweet

    Click to Tweet is a website that automatically generates links for users to share content through their own Twitter accounts.

  • Google My Business

    Google My Business is a free online business listing service that is integrated with the Google search engine.

View All SEO Definitions Back to Top

Software asset management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • asset management

    Asset management is a financial service offered by professional firms for the holding, transferring, buying and selling of different types of cash and investments.

  • Hadoop

    Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems.

  • software resilience testing

    Software resilience testing is a method of software testing that focuses on ensuring that applications will perform well in real-life or chaotic conditions.

View All Software asset management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • RAID 6 (redundant array of independent disks)

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID set before any data is lost.

  • data protection

    Data protection is the process of safeguarding important information from corruption, compromise or loss.

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • RAID 6 (redundant array of independent disks)

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

Close