Browse Definitions:

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

ERP

Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies or assets between parties under certain conditions.

  • managed IT service

    A managed IT service is an information technology (IT) task provided by a third-party contractor and delivered to a customer.

  • blockchain economy

    The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis.

View All ERP Definitions

Business software

Terms related to business software, including definitions about billing and words and phrases about supply chain, CRM, POS, ERP, accounting, payroll and inventory.

  • payroll software

    Payroll software automates the process of paying salaried, hourly and contingent employees.

  • sales and operations planning (S&OP)

    Sales and operations planning (S&OP) is a process for better matching a manufacturer's supply with demand by having the sales department collaborate with operations to create a single production plan.

  • transportation management system (TMS)

    A transportation management system (TMS) is a subset of supply chain management (SCM) that deals with the planning, execution and optimization of the physical movements of goods.

View All Business software Definitions Back to Top

Compliance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

View All Compliance Definitions Back to Top

CRM

Terms related to customer relationship management (CRM), including definitions about call centers and contact centers.

  • Interactive Voice Response (IVR)

    Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipients.

  • compliance gaining (behavioral compliance gaining)

    Compliance gaining (behavioral compliance gaining) is the process of getting someone to do what you want them to do, despite any reluctance on their part.

  • sampling error

    A sampling error is a problem in the way that members of a population are selected for research or data collection, which impacts the validity of results.

View All CRM Definitions Back to Top

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the Department of Defense.

  • Presidential Policy Directive 21 (PPD-21)

    Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Protection and Resilience is a directive that aims to strengthen and secure functioning and resilient critical infrastructure.

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.'

View All Government IT Definitions Back to Top

Healthcare IT

Terms related to healthcare IT, including definitions about healthcare information and management systems and words and phrases about electronic health records, meaningful use, government regulations and medical technology.

  • biofeedback

    Biofeedback is a system that monitors biological data from users and trains them to improve their physiological responses, with the goal of improving physical and mental health and performance.

  • transformative technology

    Transformative technology is hardware- and software-based tools designed to enhance human psychological well-being, cognitive function and physical capabilities.

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to physicians as software as a service (SaaS).

View All Healthcare IT Definitions Back to Top

HR management

  • payroll software

    Payroll software automates the process of paying salaried, hourly and contingent employees.

  • talent activation

    Talent activation is a human resources strategy for improving team leadership and workgroup collaboration that involves using surveys and questionnaires to solicit employee feedback on a regular basis. The goal of continuous feedback is to help the organization improve communication, create a climate of trust, encourage cooperation within and between workgroups and help front-line managers become better team leaders.

  • manager self-service

    Manager self-service is self-service platform that enables managers to get immediate access to employee information and initiate employment-related actions.

View All HR management Definitions Back to Top

IT procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • Request for Proposal (RFP)

    A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.

  • supply chain management (SCM)

    Supply chain management (SCM) is the broad range of activities required to plan, control and execute a product's flow, from acquiring raw materials and production through distribution to the final customer, in the most streamlined and cost-effective way possible.

  • managed service provider (MSP)

    A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.

View All IT procurement Definitions Back to Top

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

  • inline deduplication

    Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.

  • Network layer

    Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the network layer's primary function is to move data into and through other networks.

  • DNS redirection

    DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.

View All Network administration Definitions Back to Top

Project management

Terms related to project management, including definitions about project management methodologies and tools.

  • Mandela effect

    The Mandela effect is an observed phenomenon in which a large segment of the population misremembers a significant event or shares a memory of an event that did not actually occur. Fiona Broome, a paranormal researcher, coined the term to describe collective false memory when she discovered that a significant number of people at a conference she was attending in 2010 shared her memory that Nelson Mandela had died in prison during the 1980s.

  • CompTIA Project+

    CompTIA Project + is the Computing Technology Industry Association’s certification program designed to demonstrate validated learning and skills in project management.

  • validated learning

    Validated learning is an approach to demonstrating progress against business goals when traditional key performance indicators (KPIs) are not very useful.

View All Project management Definitions Back to Top

Security management

Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional should be familiar with, including skills, techniques and best practices.

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over a computer or other system.

  • vulnerability assessment (vulnerability analysis)

    A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization doing the assessment with the necessary knowledge, awareness and risk background to understand the threats to its environment and react appropriately.

View All Security management Definitions Back to Top

SEO

Definitions related to search engine optimization, including definitions about SEO and words and phrases about bots, spiders, organic traffic and all areas of search engine marketing (SEM).

  • Betteridge's law (of headlines)

    Betteridge's law (of headlines) is an adage that states "Any headline that ends in a question mark can be answered by the word no." The observation refers to the journalistic practice of writing sensational headlines in the form of a question in order to compensate for the author's lack of facts.

  • affiliate marketing

    Affiliate marketing is a performance-based marketing strategy in which one company pays another for referred business.

  • PageRank

    PageRank (PR) is Google’s main method of ranking web pages for placement on a search engine results page (SERP). PageRank refers to the system and the algorithmic method that Google uses to rank pages as well as the numerical value assigned to pages as a score.

View All SEO Definitions Back to Top

Software management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

  • performance management software

    Performance management software is designed to improve business performance by spurring employee productivity.

  • predictive analytics

    Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast activity, behavior and trends.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work.

View All Software management Definitions Back to Top

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • inline deduplication

    Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.

  • LTO-5

    LTO-5 is a tape format released in 2010 by the Linear Tape-Open Consortium.

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical charge in a memory device that is used to store data.

View All Storage management Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

  • Metamorphic virus

    A metamorphic virus is a type of malware that is capable of changing its code and signature patterns with each iteration.

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • storage medium (storage media)

    In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve ...

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close