Browse Definitions :

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • recruitment marketing

    Recruitment marketing is the combination of strategies and tools used by an organization to engage and nurture potential talent in the pre-applicant phase.

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for unforeseen risks to continued operations.

  • executive dashboard

    An executive dashboard is a computer interface that displays the key performance indicators (KPIs) that corporate officers need to effectively run an enterprise.

View All Business software Definitions

Compliance, risk and governance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for unforeseen risks to continued operations.

  • PCI DSS merchant levels

    Merchant levels are used by the payment card industry (PCI) to determine risk levels and determine the appropriate level of security for their businesses. Specifically, merchant levels determine the amount of assessment and security validation that is required for the merchant to pass PCI DSS assessment.

  • corporate activism

    Corporate activism is a public stance taken by a major company to positively impact social change or legislation.

View All Compliance, risk and governance Definitions Back to Top

CRM

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • digital experience (DX)

    Digital experience (DX) is the combination of interactions and overall sentiment that consumers have with an organization's digital touchpoints.

  • customer base

    Customer base is the group of clients to whom a business markets and sells their goods or services.

  • social selling

    Social selling is a B2B and B2C social media marketing (SMM) strategy that utilizes social networking sites and applications to generate leads, sales or one-on-one relationships with consumers.

View All CRM Definitions Back to Top

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • market intelligence manager

    A market intelligence manager is a corporate employee who studies a given market, makes recommendations as to actions to capitalize on opportunities and helps direct strategy to assist the company in reaching its revenue targets.

  • logistics

    Logistics is the process of planning and executing the efficient transportation and storage of goods from the point of origin to the point of consumption.

  • Passive Candidate

    A passive candidate (passive job candidate) is anyone in the workforce who is not actively looking for a job.

View All ERP Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • Joint Enterprise Defense Infrastructure (JEDI)

    Joint Enterprise Defense Infrastructure (JEDI) is the proposed Department of Defense (DoD) cloud infrastructure network.

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • SSAE 16

    The Statement on Standards for Attestation Engagements No. 16 (SSAE 16) is a set of auditing standards and guidance on using the standards, published by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA), for redefining and updating how service companies report on compliance controls.

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • prescription drug monitoring program (PDMP)

    A prescription drug monitoring program (PDMP) is an electronic database that collects designated data on controlled substances that are prescribed and dispensed within a state.

  • HIMSS (Healthcare Information and Management Systems Society)

    The Healthcare Information and Management Systems Society (HIMSS) is a nonprofit organization whose goal is to promote the best use of IT and management systems in the healthcare industry.

  • Meaningful Use

    In the context of health IT, meaningful use is a term used to define minimum U.S. government standards for electronic health records (EHR), outlining how clinical patient data should be exchanged between healthcare providers, between providers and insurers and between providers and patients.

View All Healthcare IT Definitions Back to Top

HR management

  • zero tolerance

    Zero tolerance is a hardline policy preventing or protecting against something that is undesirable in a given environment.

  • Director of Employee Engagement

    Director of employee engagement is one of the job titles for an HR manager who is responsible for an organization's employee engagement strategy.

  • IT consultant

    A consultant is an experienced individual in a given field who provides expert advice for a fee. Consultants typically work as independent contractors and are hired on a short-term basis. A consultant may also be an employee at a consulting firm.

View All HR management Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • clickwrap agreement (clickthrough agreement)

    A clickwrap agreement, also known as a clickthrough agreement, is an online contract that confirms a user's consent to a company's terms and conditions.

  • sidecar proxy

    A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of the application as a whole.

  • ISV (independent software vendor)

    An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.

View All IT procurement Definitions Back to Top

Network management

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • HashiCorp

    HashiCorp is a software company that provides a suite of modular DevOps infrastructure provisioning and management products.

  • service mesh

    A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.

  • data reduction

    Data reduction is the process of reducing the amount of capacity required to store data.

View All Network management Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • Microsoft Planner

    Microsoft Planner is a project management application developed by Microsoft that allows teams to create, assign and organize work visually.

  • project management

    Project management is the discipline of using established principles, procedures and policies to successfully guide a project from conception through completion.

  • IT consultant

    A consultant is an experienced individual in a given field who provides expert advice for a fee. Consultants typically work as independent contractors and are hired on a short-term basis. A consultant may also be an employee at a consulting firm.

View All Project management Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.

  • nuclear option

    The nuclear option, in a colloquial sense, is the most extreme solution to a given problem.

View All Security management Definitions Back to Top

SEO

Definitions related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • microdata

    Microdata is a type of specification language that is embedded within HTML content to improve machine readability, annotate elements and analyze web pages.

  • Click to Tweet

    Click to Tweet is a website that automatically generates links for users to share content through their own Twitter accounts.

  • Google My Business

    Google My Business is a free online business listing service that is integrated with the Google search engine.

View All SEO Definitions Back to Top

Software asset management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • systems integrator

    A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.

  • Netflix Spinnaker

    Netflix Spinnaker is an open source, multi-cloud continuous delivery application that can be used to release software updates rapidly and efficiently.

  • support-driven development

    Support-driven development is a strategy used by developers to create products that fit the needs of customers by designing them based on direct customer feedback.

View All Software asset management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • data retention policy

    A data retention policy dictates the types of data to be retained and the duration for which that data must be stored in accordance with operational or regulatory requirements.

  • data reduction

    Data reduction is the process of reducing the amount of capacity required to store data.

  • Amazon S3

    Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service designed for online backup and archiving of data and applications on Amazon Web Services.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close