Browse Definitions :

IT Career Management

Analytics

This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.

  • descriptive analytics

    Descriptive analytics is a type of data analytics that looks at past data to give an account of what has happened.

  • big data

    Big data is a combination of structured, semistructured and unstructured data collected by organizations that can be mined for information and used in machine learning projects, predictive modeling and other advanced analytics applications.

  • cloud computing

    Cloud computing is a general term for anything that involves delivering hosted services over the internet.

View All Analytics Definitions

Certifications

This glossary contains definitions related to IT Certifications.

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.

  • Certified Associate in Project Management (CAPM)

    The Certified Associate in Project Management (CAPM) is a vendor-neutral, entry-level certification to help individuals acquire project management (PM) skills.

View All Certifications Definitions Back to Top

Cloud Computing

Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.

  • sharding

    Sharding is a type of database partitioning that separates large databases into smaller, faster, more easily managed parts.

  • private platform as a service (private PaaS)

    Private platform as a service (private PaaS) is software that facilitates development, deployment and operations for IT on a private infrastructure or behind a firewall.

  • grid computing

    Grid computing is a system for connecting a large number of computer nodes into a distributed architecture that delivers the compute resources necessary to solve complex problems.

View All Cloud Computing Definitions Back to Top

DevOps

This glossary contains definitions related to the DevOps movement. Some definitions explain the meaning of words used to describe how a DevOps culture breaks down silos between software development and operations teams. Other definitions are related to the software tools that DevOps engineers use to lower costs, achieve higher productivity and automate tasks.

  • WebLogic

    Oracle WebLogic Server is a leading e-commerce online transaction processing (OLTP) platform, developed to connect users in distributed computing production environments and to facilitate the integration of mainframe applications with distributed corporate data and applications.

  • Eclipse (Eclipse Foundation)

    Eclipse is a free, Java-based development platform known for its plugins that allow developers to develop and test code written in other programming languages.

  • Lean software development

    Lean software development is a concept that emphasizes optimizing efficiency and minimizing waste in the development of software.

View All DevOps Definitions Back to Top

IT Career Paths

  • chief trust officer

    A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information.

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.

View All IT Career Paths Definitions Back to Top

IT Operations

Terms related to the processes and services implemented and managed by an organization’s information technology (IT) department. Topics covered include systems management, configuration management, API management and DevOps, as well as real-time performance monitoring and management.

  • domain controller

    A domain controller is a type of server that processes requests for authentication from users within a computer domain.

  • What is DevOps? The ultimate guide

    The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.

  • ModelOps (model operations)

    ModelOps (model operations) is a holistic approach to building analytics models that can quickly progress from the lab to production.

View All IT Operations Definitions Back to Top

Marketing and CX

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • prescriptive analytics

    Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.

  • buzz marketing

    Buzz marketing is a viral marketing technique focused on maximizing the word-of-mouth potential of a campaign or product.

  • Windows Server Update Services (WSUS)

    Windows Server Update Services (WSUS) is a Windows server role that can plan, manage and deploy updates, patches and hotfixes for Windows servers, client operating systems and other Microsoft software.

View All Marketing and CX Definitions Back to Top

Network Admin

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • desktop management

    Desktop management is a comprehensive approach to managing all the computers within an organization.

  • time-division multiplexing (TDM)

    Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.

  • Windows Server Update Services (WSUS)

    Windows Server Update Services (WSUS) is a Windows server role that can plan, manage and deploy updates, patches and hotfixes for Windows servers, client operating systems and other Microsoft software.

View All Network Admin Definitions Back to Top

Project Management

Terms related to project management, including definitions about project management methodologies and tools.

  • What is DevOps? The ultimate guide

    The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.

  • Gantt chart

    A Gantt chart is a horizontal bar chart developed as a production control tool in 1917 by Henry L. Gantt, an American engineer and social scientist.

  • chief risk officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.

View All Project Management Definitions Back to Top

Security Admin

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • Public-Key Cryptography Standards (PKCS)

    Public-Key Cryptography Standards (PKCS) are a set of standard protocols, numbered from 1 to 15.

  • Rijndael

    Rijndael (pronounced rain-dahl) is an Advanced Encryption Standard (AES) algorithm.

  • honeynet

    A honeynet is a network set up with intentional vulnerabilities hosted on a decoy server to attract hackers.

View All Security Admin Definitions Back to Top

Software Developer

Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.

  • mobile platform as a service (mPaaS)

    Mobile platform as a service (mPaaS) is a specialized type of PaaS designed to provide an integrated development environment (IDE), deployment platform, lifecycle management and analytics for mobile/web applications.

  • service virtualization

    Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.

  • go-live (go live)

    Go-live is the time at which something becomes available for use.

View All Software Developer Definitions Back to Top

Technical Support

Terms related to computer fundamentals, including computer hardware definitions and words and phrases about software, operating systems, peripherals and troubleshooting.

  • content aggregator

    A content aggregator is an individual, organization or tool that gathers web content and applications from different online sources for reuse.

  • virtual

    In computing, the term virtual refers to a digitally replicated version of something real, whether it's a machine, a switch, memory or even reality.

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

View All Technical Support Definitions Back to Top
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close