Browse Definitions :

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • Windows 7

    Windows 7 is the Microsoft Windows operating system (OS) released commercially in October 2009 as the successor to Windows Vista.

  • SAP Ariba

    SAP Ariba is a software company that provides cloud-based procurement, spend management and supply chain services that enable suppliers and buyers to connect and do business globally.

  • Zugata

    Zugata is performance management software that helps employers to gather continuous feedback about individual employees in order to foster a corporate culture that empowers each employee to reach his or her full potential. The vendor, which is also called Zugata, is based in Palo Alto, California.

View All Business software Definitions

Compliance, risk and governance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • good automated manufacturing practice (GAMP)

    Good automated manufacturing practice (GAMP) is a set of guidelines manufacturers and other automation users follow to maintain operational efficiency and reliability.

  • gag order

    A gag order is a stipulation that those so-ordered will not divulge information learned in a particular situation, such as a court, a public office or a corporate environment.

  • IT incident management

    Incident management, in information technology, is a process designed to return service to normal as quickly as possible after an incident, in a way that has with little to no negative impact on the business... (Continued)

View All Compliance, risk and governance Definitions Back to Top

CRM

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • ToS;DR

    ToS;DR is a user rights initiative that breaks down good and bad points about the terms of service (ToS) and privacy policies for prominent websites and gives them an overall rating from Class A (very good) to Class B (very bad).

  • deplatform

    To deplatform someone is to remove their access to a channel for delivering messages to an audience.

  • terms of service (ToS)

    Terms of service (ToS) is a type of document stating details about what a service provider is responsible for as well as user obligations that must be adhered to for continuation of the service.

View All CRM Definitions Back to Top

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • IT asset management (ITAM)

    IT asset management (information technology asset management, or ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.

  • market development funds (MDF)

    Market development funds (MDF) are a resource that a vendor grants to its indirect sales channel partners to help the channel with sales and marketing programs.

  • authentic leadership

    Authentic leadership is a type of management style in which people act in a real, genuine and sincere way that is true to who they are as individuals.

View All ERP Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • Department of Space (India)

    The Department of Space (DoS) is a department created by the Indian government to manage their space program and oversee a number of related agencies and institutes.

  • Space Force (United States Space Force)

    Space Force is a proposed branch of the United States Armed Forces. In June 2018, President Trump announced plans for a Space Force to complement the Army, Navy, Air Force, Marines and Coast Guard and defend the United States and its orbital assets from attack.

  • G-Cloud (Government Cloud)

    Government Cloud, also referred to as G-Cloud, is a U.K. government program to promote government-wide adoption of cloud computing.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

View All Healthcare IT Definitions Back to Top

HR management

  • FIRE (Financial Independence, Retire Early)

    FIRE (Financial Independence, Retire Early) is a lifestyle, also referred to as a movement, aimed at reducing expenditures and increasing investing in order to quickly gain financial independence and the possibility of retirement at an early age.

  • digital HR

    Digital HR is the digital transformation of HR services and processes through the use of social, mobile, analytics and cloud (SMAC) technologies.

  • Compensation Management

    Compensation management is a critical part of talent management and employee retention.

View All HR management Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • Alibaba Holding Group Limited

    Alibaba Group Holding Limited is a Chinese business conglomerate that runs the world’s largest retailer and one of the largest online e-commerce sites in the world, Alibaba.com.

  • ERP (enterprise resource planning)

    ERP, or enterprise resource planning, is a modular software system designed to integrate the main functional areas of an organization's business processes into a unified system.

  • value-added reseller (VAR)

    A value-added reseller (VAR) is a company that resells software, hardware and networking products and provides value beyond order fulfillment.

View All IT procurement Definitions Back to Top

Network management

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • performance testing

    Performance testing is the process of determining the speed, responsiveness and stability of a computer, network, software program or device under a workload.

  • log analytics

    Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.

  • OTA update (over-the-air update)

    An over-the-air update is the wireless delivery of new software or data to mobile devices.

View All Network management Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • Project Management Body of Knowledge (PMBOK)

    The Project Management Body of Knowledge (PMBOK) is a document containing standard terminology, best practices and process guidelines around project management as defined by the Project Management Institute (PMI).

  • performance testing

    Performance testing is the process of determining the speed, responsiveness and stability of a computer, network, software program or device under a workload.

  • equilibrium price

    An equilibrium price, also known as a market-clearing price, is the consumer cost assigned to some product or service such that supply and demand are equal, or close to equal.

View All Project management Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to penetrate a computer system, network, application or other computing resource on behalf of its owners -- and with their permission -- to find security vulnerabilities that a malicious hacker could potentially exploit.

  • performance testing

    Performance testing is the process of determining the speed, responsiveness and stability of a computer, network, software program or device under a workload.

View All Security management Definitions Back to Top

SEO

Definitions related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • voice SEO

    Voice SEO is the optimization of keywords and keyword phrases for searches through voice assistants.

  • listicle

    A listicle is an index whose point items are supplemented with additional related commentary. The term is a portmanteau of the words list and article.

  • SEO (search engine optimization)

    Search engine optimization (SEO) is an area of website development that seeks to improve the way content is ranked by search engines. To put the focus on the website visitor, its been suggested that acronym SEO should stand for search experience optimization.

View All SEO Definitions Back to Top

Software asset management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • application

    An application, also referred to as an application program or application software, is a computer software package that performs a specific function directly for an end user or, in some cases, for another application.

  • log analytics

    Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.

  • 12 factor app (twelve-factor app)

    Twelve-factor app is a methodology for building distributed applications that run in the cloud and are delivered as a service. The approach was developed by Adam Wiggins, the co-founder of Horoku, a platform-as-a-service which is now part of Salesforce.com.

View All Software asset management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • RAID 0 (disk striping)

    RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple storage devices, such as hard disks or solid-state drives (SSDs), in a redundant array of independent disks (RAID) group.

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • gigabyte

    A gigabyte -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion bytes.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

  • RAID 0 (disk striping)

    RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple ...

Close