Browse Definitions :

IT Career Management

Analytics

This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.

  • Windows Management Instrumentation (WMI)

    Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network from Windows computing systems.

  • data lifecycle management (DLM)

    Data lifecycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its lifecycle: from creation and initial storage to when it becomes obsolete and is deleted.

  • LOB (line of business)

    An LOB (line-of-business) application is one of the set of critical computer applications that are vital to running an enterprise, such as accounting, supply chain management, and resource planning applications.

View All Analytics Definitions

Certifications

This glossary contains definitions related to IT Certifications.

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.

  • Certified Associate in Project Management (CAPM)

    The Certified Associate in Project Management (CAPM) is a vendor-neutral, entry-level certification to help individuals acquire project management (PM) skills.

View All Certifications Definitions Back to Top

Cloud Computing

Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.

  • cloud audit

    A cloud audit is a periodic examination an organization does to assess and document its cloud vendor's performance.

  • hybrid IT

    Hybrid IT is an approach to enterprise computing in which an organization provides and manages some information technology (IT) resources in-house but uses cloud-based services for others.

  • cloud NAS (cloud network attached storage)

    Cloud NAS (network attached storage) is remote storage that is accessed over the internet as if it is local.

View All Cloud Computing Definitions Back to Top

DevOps

This glossary contains definitions related to the DevOps movement. Some definitions explain the meaning of words used to describe how a DevOps culture breaks down silos between software development and operations teams. Other definitions are related to the software tools that DevOps engineers use to lower costs, achieve higher productivity and automate tasks.

  • ModelOps (model operations)

    ModelOps (model operations) is a holistic approach to building analytics models that can quickly progress from the lab to production.

  • Scrum

    Scrum is a framework for project management that emphasizes teamwork, accountability and iterative progress toward a well-defined goal.

  • poka-yoke

    A poka-yoke is a mechanism that is put in place to prevent human error.

View All DevOps Definitions Back to Top

IT Career Paths

  • chief trust officer

    A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information.

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.

View All IT Career Paths Definitions Back to Top

IT Operations

Terms related to the processes and services implemented and managed by an organization’s information technology (IT) department. Topics covered include systems management, configuration management, API management and DevOps, as well as real-time performance monitoring and management.

  • ModelOps (model operations)

    ModelOps (model operations) is a holistic approach to building analytics models that can quickly progress from the lab to production.

  • data management as a service (DMaaS)

    Data management as a service (DMaaS) is a type of cloud service that provides enterprises with centralized storage for disparate data sources.

  • operational efficiency

    Operational efficiency is the ability of an organization to reduce waste in time, effort and materials as much as possible, while still producing a high-quality service or product.

View All IT Operations Definitions Back to Top

Marketing and CX

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • call center

    A call center is a centralized department that handles inbound and outbound calls from current and potential customers.

  • multichannel marketing

    Multichannel marketing refers to the practice by which companies interact with customers via multiple channels, both direct and indirect, in order to sell them goods and services.

  • call center agent (call center representative)

    A call center agent is a person who handles incoming or outgoing customer calls for a business.

View All Marketing and CX Definitions Back to Top

Network Admin

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • chatty protocol

    A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again.

  • network virtualization

    Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between virtual machines (VMs).

  • virtual desktop

    A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.

View All Network Admin Definitions Back to Top

Project Management

Terms related to project management, including definitions about project management methodologies and tools.

  • Gantt chart

    A Gantt chart is a horizontal bar chart developed as a production control tool in 1917 by Henry L. Gantt, an American engineer and social scientist.

  • chief risk officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks, costs and deadlines.

View All Project Management Definitions Back to Top

Security Admin

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • black hat hacker

    A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or disrupting systems -- but increasingly, more specific terms are being used to describe those people.

  • cookie poisoning

    Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain unauthorized access to a user's account, open a new account in the user's name or steal the user's information for purposes such as identity theft.

  • footprinting

    Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them.

View All Security Admin Definitions Back to Top

Software Developer

Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.

  • service virtualization

    Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.

  • go-live (go live)

    Go-live is the time at which something becomes available for use.

  • poka-yoke

    A poka-yoke is a mechanism that is put in place to prevent human error.

View All Software Developer Definitions Back to Top

Technical Support

Terms related to computer fundamentals, including computer hardware definitions and words and phrases about software, operating systems, peripherals and troubleshooting.

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical or silicon-based storage media.

  • content filtering

    On the internet, content filtering -- also known as information filtering -- is the use of a program to screen and exclude from access or availability webpages or email that is deemed objectionable.

  • program

    In computing, a program is a specific set of ordered operations for a computer to perform.

View All Technical Support Definitions Back to Top
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • black hat hacker

    A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or ...

  • cookie poisoning

    Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain ...

  • footprinting

    Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close