Browse Definitions :

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • business intelligence dashboard

    A business intelligence dashboard is a graphical interface that displays the current status of metrics and key performance indicators (KPIs) for an enterprise.

  • SAP Business Suite

    SAP Business Suite is a bundle of end-to-end enterprise software applications that integrate data, processes and functions for important areas such as finance, sales and HR, as well as industry-focused features.

  • property management system (PMS)

    A property management system (PMS) is a software application for the operations of hotels, other hospitality accommodations and commercial residential rental properties.

View All Business software Definitions

Compliance, risk and governance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • hate speech

    Hate speech is a verbal or written communication expressing a generalized negative opinion about a particular demographic, sometimes attacking an individual as a member of that group.

  • freedom of expression

    Freedom of expression is the right of individuals and organizations to exchange information without fear of repercussion or censorship.

  • First Amendment to the Constitution

    The First Amendment to the United States Constitution is one of a group of ten additions to the original document that provided a framework for law within the country.

View All Compliance, risk and governance Definitions Back to Top

CRM

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • conversational commerce (voice commerce)

    Conversational commerce is the process of interacting with a brand or buying a product or service through non-traditional channels, such as voice assistants, SMS text and online and social media chat.

  • lead trajectory

    A lead trajectory is a projected path of a lead or potential customer as it applies to a goal, such as signing the customer up for a service or making a sale.

  • brand experience

    Brand experience is a type of experiential marketing that incorporates a holistic set of conditions created by a company to influence the feeling a customer has about a particular product or company name.

View All CRM Definitions Back to Top

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • data modeling

    Data modeling is the process of documenting a complex software system design as an easily understood diagram, using text and symbols to represent the way data needs to flow.

  • IT transformation

    IT transformation is a complete reassessment and overhaul of an organization's information technology (IT) systems in order to improve the efficiency and delivery in a digital economy.

  • rainmaker (business)

    A rainmaker is an individual who generates an unusually high amount of revenue for an organization by bringing new clients and new business to the company.

View All ERP Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • Department of Space (India)

    The Department of Space (DoS) is a department created by the Indian government to manage their space program and oversee a number of related agencies and institutes.

  • Space Force (United States Space Force)

    Space Force is a proposed branch of the United States Armed Forces. In June 2018, President Trump announced plans for a Space Force to complement the Army, Navy, Air Force, Marines and Coast Guard and defend the United States and its orbital assets from attack.

  • G-Cloud (Government Cloud)

    Government Cloud, also referred to as G-Cloud, is a U.K. government program to promote government-wide adoption of cloud computing.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • neurofeedback

    Neurofeedback is a therapeutic method based on presenting to clients a real-time display of their brain activity and training them, over time, to learn to control that activity.

  • ICD-10-CM (Clinical Modification)

    The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.

  • computerized physician order entry (CPOE)

    Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.

View All Healthcare IT Definitions Back to Top

HR management

  • rainmaker (business)

    A rainmaker is an individual who generates an unusually high amount of revenue for an organization by bringing new clients and new business to the company.

  • soft skills

    The term soft skills refers to the personal traits, characteristics and competencies that inform to how an individual relates to others and is often used as a synonym for people skills or interpersonal skills.

  • employee onboarding and offboarding

    Employee onboarding and offboarding are two core HR activities that are gaining in importance.

View All HR management Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • ISV (independent software vendor)

    An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.

  • procure to pay (P2P)

    Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.

  • Alibaba Holding Group Limited

    Alibaba Group Holding Limited is a Chinese business conglomerate that runs the world’s largest retailer and one of the largest online e-commerce sites in the world, Alibaba.com.

View All IT procurement Definitions Back to Top

Network management

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • hosted services

    Hosted services are applications, IT infrastructure components or functions that organizations access from external service providers, typically through an internet connection.

  • network analytics

    Network analytics is the application of big data principles and tools to the management and security of data networks.

  • performance testing

    Performance testing is the process of determining the speed, responsiveness and stability of a computer, network, software program or device under a workload.

View All Network management Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • DevOps

    In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable. In its most narrow interpretation, DevOps describes the part of an organization’s information technology (IT) team that creates and maintains infrastructure.

  • rainmaker (business)

    A rainmaker is an individual who generates an unusually high amount of revenue for an organization by bringing new clients and new business to the company.

  • terminology management

    Terminology management is the systematized collection of concepts and terms with the purpose of unifying and standardizing technical documentation.

View All Project management Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • pen test (penetration testing)

    Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems.

View All Security management Definitions Back to Top

SEO

Definitions related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • Google My Business

    Google My Business is a free online business listing service that is integrated with the Google search engine.

  • search engine

    A search engine is a program that gathers information (web pages) in a database and provides relevant results to user keyword queries.

  • voice SEO

    Voice SEO is the optimization of keywords and keyword phrases for searches through voice assistants.

View All SEO Definitions Back to Top

Software asset management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • application

    An application, also referred to as an application program or application software, is a computer software package that performs a specific function directly for an end user or, in some cases, for another application.

  • log analytics

    Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.

  • 12 factor app (twelve-factor app)

    Twelve-factor app is a methodology for building distributed applications that run in the cloud and are delivered as a service. The approach was developed by Adam Wiggins, the co-founder of Heroku, a platform-as-a-service which is now part of Salesforce.com.

View All Software asset management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • streaming data architecture

    A streaming data architecture is an information technology framework that puts the focus on processing data in motion and treats extract-transform-load (ETL) batch processing as just one more event in a continuous stream of events.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close