Browse Definitions :

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • NetSuite

    NetSuite is a business technology vendor based in San Mateo, California.

  • robotic process automation (RPA)

    Robotic process automation (RPA) is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required humans to perform.

  • Cloudability

    Cloudability is a software vendor that provides financial management tools for monitoring and analyzing cloud computing costs.

View All Business software Definitions

Compliance, risk and governance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • corporate governance

    Corporate governance is the combination of rules, processes or laws by which businesses are operated, regulated or controlled.

  • cartel

    A cartel is a body of independent producers that work together to decide production levels and prices. When a cartel is able to set prices and mandate production levels, it ensures that members will not have to deal with outside competition.

  • PTO (paid time off, personal time off)

    Paid time off (PTO) is a human resource management (HRM) policy that provides employees with a pool of bankable hours that can be used for any purpose.

View All Compliance, risk and governance Definitions Back to Top

CRM

The goal of customer experience management (CEM) is to optimize customer satisfaction at each touchpoint of the customer journey. This involves creating customer-centric strategies to improve reach, engagement and retention. Definitions in this glossary include terms about marketing and creating a brand personality, the use of AI and RPA in martech, capturing and analyzing customer feedback and contact center automation.

  • growth hacking

    Growth hacking is an approach to driving product adoption, usage and sales by experimental, innovative and low-cost means.

  • sales automation tools

    Sales automation tools relieve sales agents of tasks that take them away from interacting with current and potential customers.

  • point of sale platform

    A point of sale platform is software that supports the completion of a retail transaction.

View All CRM Definitions Back to Top

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • maturity grid (maturity model)

    A maturity grid is an assessment tool for evaluating an organization's level of progress towards a goal.

  • voice of the customer (VOC)

    Voice of the customer (VOC) is the component of customer experience (CX) and customer satisfaction (CSAT) that focuses on the perception of a customer's needs, wants, expectations and preferences.

  • brand equity

    Brand equity is the perceived value a company gains by having a known name, logo or other identifier.

View All ERP Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • remote patient monitoring (RPM)

    Remote patient monitoring (RPM) is a subcategory of homecare telehealth that allows patients to use mobile medical devices or technology to gather patient-generated health data (PGHD) and send it to healthcare professionals.

  • telestroke (telestroke services)

    Telestroke is a web-based approach to treating stroke victims who have not been admitted to a hospital. In its most basic form, a telestroke system requires a neurologist and attending nurse to have a high-speed Internet connection and videoconferencing capabilities through a phone, laptop, tablet or desktop computer.

  • HIPAA (Health Insurance Portability and Accountability Act)

    HIPAA (Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information.

View All Healthcare IT Definitions Back to Top

HR management

  • Human Resource Certification Institute (HRCI)

    HRCI (Human Resource Certification Institute) is a U.S. based credentialing organization offering certifications to HR generalists, administrators and managers. The certifications are awarded upon successful completion of competency exams that cover Human Resource Management (HRM) practices, policies and principles.

  • professional services

    A professional service is an intangible product that a contractor or product vendor sells to help a customer manage a specific part of their business.

  • PTO (paid time off, personal time off)

    Paid time off (PTO) is a human resource management (HRM) policy that provides employees with a pool of bankable hours that can be used for any purpose.

View All HR management Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • platform economy

    Platform economy is the tendency for commerce to increasingly move towards and favor digital platform business models.

  • feedback loop

    A feedback loop is a system where some portion or all of the output produced by the system returns as input, effecting the succeeding processes of that system in some way.

  • service level indicator

    A service level indicator (SLI) is a carefully defined measure of performance within a provided service that is given to a customer by the vendor.

View All IT procurement Definitions Back to Top

Network management

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • Group Policy

    Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers. Group policy is primarily a security tool, and can be used to apply security settings to users and computers.

  • computer network

    A a computer network, also referred to as a data network, is a series of points or nodes interconnected by communication paths for transmitting, receiving and exchanging data, voice and video traffic.

  • intent-based networking (IBN)

    Intent-based networking (IBN) is a form of network administration that incorporates artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network.

View All Network management Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • gig economy

    A gig economy is a free market system in which temporary positions are common and organizations contract with independent workers for short-term engagements.

  • unknown known

    An unknown known is information that an individual or organization has in its possession but whose existence, relevance or value has not been realized.

  • contingency budget (cost contingency)

    Contingency, in the context of project management, is an amount of money that is included to cover potential events that are not specifically accounted for in a cost estimate.

View All Project management Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating computer applications.

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by a computing device.

  • Faraday cage

    A Faraday cage is a metallic enclosure that prevents the entry or escape of an electromagnetic field (EM field).

View All Security management Definitions Back to Top

SEO

Definitions related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • microdata

    Microdata is a type of specification language that is embedded within HTML content to improve machine readability, annotate elements and analyze web pages.

  • Click to Tweet

    Click to Tweet is a website that automatically generates links for users to share content through their own Twitter accounts.

  • Google My Business

    Google My Business is a free online business listing service that is integrated with the Google search engine.

View All SEO Definitions Back to Top

Software asset management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • event

    An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.

  • Software as a Service (SaaS)

    Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.

  • enterprise content management (ECM)

    Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers. To differentiate themselves from competitors, some ECM vendors are beginning to market their products as content management services or content management platforms.

View All Software asset management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • Storage vMotion

    Storage vMotion is a component of VMware vSphere that allows the live migration of a running virtual machine's (VM) file system from one storage system to another, with no downtime for the VM or service disruption for end users.

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes referred to as non-volatile storage.

  • data lake

    A data lake is a storage repository that holds a vast amount of raw data in its native format until it is needed.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close