IT Career Management
Analytics
This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.
-
Windows Management Instrumentation (WMI)
Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network from Windows computing systems.
-
data lifecycle management (DLM)
Data lifecycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its lifecycle: from creation and initial storage to when it becomes obsolete and is deleted.
-
LOB (line of business)
An LOB (line-of-business) application is one of the set of critical computer applications that are vital to running an enterprise, such as accounting, supply chain management, and resource planning applications.
Certifications
This glossary contains definitions related to IT Certifications.
-
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
-
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.
-
Certified Associate in Project Management (CAPM)
The Certified Associate in Project Management (CAPM) is a vendor-neutral, entry-level certification to help individuals acquire project management (PM) skills.
Cloud Computing
Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.
-
cloud audit
A cloud audit is a periodic examination an organization does to assess and document its cloud vendor's performance.
-
hybrid IT
Hybrid IT is an approach to enterprise computing in which an organization provides and manages some information technology (IT) resources in-house but uses cloud-based services for others.
-
cloud NAS (cloud network attached storage)
Cloud NAS (network attached storage) is remote storage that is accessed over the internet as if it is local.
DevOps
This glossary contains definitions related to the DevOps movement. Some definitions explain the meaning of words used to describe how a DevOps culture breaks down silos between software development and operations teams. Other definitions are related to the software tools that DevOps engineers use to lower costs, achieve higher productivity and automate tasks.
-
command-line interface (CLI)
A command-line interface (CLI) is a text-based user interface (UI) used to run programs, manage computer files and interact with the computer.
-
ModelOps (model operations)
ModelOps (model operations) is a holistic approach to building analytics models that can quickly progress from the lab to production.
-
Scrum
Scrum is a framework for project management that emphasizes teamwork, accountability and iterative progress toward a well-defined goal.
IT Career Paths
-
chief trust officer
A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information.
-
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
-
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.
IT Operations
Terms related to the processes and services implemented and managed by an organization’s information technology (IT) department. Topics covered include systems management, configuration management, API management and DevOps, as well as real-time performance monitoring and management.
-
ModelOps (model operations)
ModelOps (model operations) is a holistic approach to building analytics models that can quickly progress from the lab to production.
-
data management as a service (DMaaS)
Data management as a service (DMaaS) is a type of cloud service that provides enterprises with centralized storage for disparate data sources.
-
operational efficiency
Operational efficiency is the ability of an organization to reduce waste in time, effort and materials as much as possible, while still producing a high-quality service or product.
Marketing and CX
Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.
-
Windows Server Update Services (WSUS)
Windows Server Update Services (WSUS) is a Windows server role that can plan, manage and deploy updates, patches and hotfixes for Windows servers, client operating systems and other Microsoft software.
-
call center
A call center is a centralized department that handles inbound and outbound calls from current and potential customers.
-
multichannel marketing
Multichannel marketing refers to the practice by which companies interact with customers via multiple channels, both direct and indirect, in order to sell them goods and services.
Network Admin
Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.
-
time-division multiplexing (TDM)
Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.
-
Windows Server Update Services (WSUS)
Windows Server Update Services (WSUS) is a Windows server role that can plan, manage and deploy updates, patches and hotfixes for Windows servers, client operating systems and other Microsoft software.
-
chatty protocol
A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again.
Project Management
Terms related to project management, including definitions about project management methodologies and tools.
-
Gantt chart
A Gantt chart is a horizontal bar chart developed as a production control tool in 1917 by Henry L. Gantt, an American engineer and social scientist.
-
chief risk officer (CRO)
The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
-
project scope
Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks, costs and deadlines.
Security Admin
Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.
-
token
In general, a token is an object that represents something else, such as another object (either physical or virtual), or an abstract concept as, for example, a gift is sometimes referred to as a token of the giver's esteem for the recipient.
-
Twofish
Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.
-
potentially unwanted program (PUP)
A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download it.
Software Developer
Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.
-
service virtualization
Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.
-
go-live (go live)
Go-live is the time at which something becomes available for use.
-
poka-yoke
A poka-yoke is a mechanism that is put in place to prevent human error.
Technical Support
Terms related to computer fundamentals, including computer hardware definitions and words and phrases about software, operating systems, peripherals and troubleshooting.
-
token
In general, a token is an object that represents something else, such as another object (either physical or virtual), or an abstract concept as, for example, a gift is sometimes referred to as a token of the giver's esteem for the recipient.
-
deadlock
A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
-
data in motion
Data in motion, also referred to as data in transit or data in flight, is a process in which digital information is transported between locations either within or between computer systems.