Browse Definitions :

IT Operations mgmt & monitoring

Terms related to the processes and services implemented and managed by an organization’s information technology (IT) department. Topics covered include systems management, configuration management, API management and DevOps, as well as real-time performance monitoring and management.

AMA - ZER

  • Amazon EC2 Container Registry - Amazon EC2 Container Registry is an AWS product that stores, manages and deploys private images of Docker containers, which are managed clusters of Elastic Compute Cloud (EC2) instances.
  • Amazon EC2 Container Service - Amazon EC2 Container Service (ECS) is a cloud computing service in Amazon Web Services (AWS) that manages containers.
  • Ansible - Ansible is an open source IT configuration management (CM) and automation platform, provided by Red Hat.
  • application containerization (app containerization) - Application containerization is an OS-level virtualization method used to deploy and run distributed applications without launching an entire virtual machine (VM) for each app.
  • application lifecycle management (ALM) - Application lifecycle management (ALM) is the supervision of a software application from its initial planning through retirement.
  • application monitoring and management (AMM) - Application monitoring and management is the administrative area and associated tools involved with overseeing the operation of business software and ensuring that it functions and performs as expected.
  • Application Performance Index (Apdex) - Application Performance Index, also known as Apdex, is an open standard intended to simplify measurement and reports of application performance.
  • automated testing - Automated software testing is a process in which software tools execute pre-scripted tests on a software application before it is released into production.
  • AWS CodeDeploy (Amazon Web Services CodeDeploy) - AWS CodeDeploy is a service that automates code deployments to Elastic Compute Cloud (EC2) and on-premises servers.
  • boot sector - A boot sector is a specially assigned section of a storage drive containing the files required to start the operating system (OS) and other bootable programs such as antivirus programs, drive partitioning software, backup tools and diagnostic disks.
  • ChatOps - ChatOps is the use of chat clients, chatbots and real-time communication tools to facilitate how software development and operation tasks are communicated and executed.
  • cloud application - A cloud application, or cloud app, is a software program where cloud-based and local components work together.
  • cloud orchestration (cloud orchestrator) - Cloud orchestration is the use of programming technology to manage the interconnections and interactions among workloads on public and private cloud infrastructure.
  • computerized maintenance management system (CMMS) - A computerized maintenance management system (CMMS) is software that helps operations and maintenance staff identify and track the status of maintenance tasks and availability of replacement parts.
  • configuration file - A configuration file, often shortened to config file, defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context.
  • configuration management (CM) - Configuration management (CM) is a governance and systems engineering process for ensuring consistency in an operational environment.
  • configuration service provider (CSP) - A configuration service provider (CSP) is a component of the Windows client operating system that shows IT professionals potential device configuration choices and allows them to apply the settings across multiple Windows OSes.
  • container management software - Container management software is programming that automates the creation, destruction, deployment and scaling of software containers.
  • Containers as a Service (CaaS) - Containers as a service (CaaS) is a cloud service that allows software developers to upload, organize, run, scale, manage and stop containers by using a provider's API calls or a web portal interface.
  • context awareness - Context awareness is the ability of a system or system component to gather information about its environment at any given time and adapt behaviors accordingly.
  • continual service improvement - Continual service improvement is a method to identify and execute opportunities to make IT processes and services better, and to objectively measure the effects of these efforts over time.
  • continuous delivery (CD) - Continuous delivery (CD) is a software release approach in which development teams produce and test code in short cycles, usually with a high degree of automation.
  • continuous deployment - Continuous deployment is a strategy for software releases wherein any code commit that passes the automated testing phase is automatically released into the production environment, making changes that are visible to the software's users.
  • corporate wellness coach (health coach) - A corporate wellness coach (health coach) is a professional who is brought into a corporate or office environment to help employees maintain and improve their health and wellness goals.
  • data access rights - A data access right (DAR) is a permission that has been granted that allows a person or computer program to locate and read digital information at rest.
  • data in use - Data in use is data that is currently being updated, processed, accessed and read by a system.
  • data lineage - Data lineage is the history of data, including where the data has traveled through-out the its existence within an organization.
  • data management-as-a-service (DMaaS) - Data Management-as-a-Service (DMaaS) is a type of cloud service that provides protection, governance and intelligence across a company’s various data sources.
  • DevOps - In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable.
  • DevOps certification - DevOps certification is a formalized testing program intended to ensure that applicants have achieved an appropriate level of skills and knowledge for working in the converged areas of software development and IT operations.
  • DevOps engineer - DevOps engineer is a professional role for information technology (IT) employees who work with development, testing and other aspects of IT to bring new software releases through development, and deploy, test and run the code on production IT infrastructure.
  • disaggregated server - A disaggregated server is a server that breaks up components and resources into subsystems.
  • distributed applications (distributed apps) - Distributed applications (distributed apps) are applications or software that runs on multiple computers within a network at the same time and can be stored on servers or with cloud computing.
  • distributed cloud - Distributed cloud is the application of cloud computing technologies to interconnect data and applications served from multiple geographic locations.
  • Docker - Docker is an open source software platform to create, deploy and manage virtualized application containers on a common operating system (OS), with an ecosystem of allied tools.
  • Docker Content Trust - Docker Content Trust is a feature in the Docker containerization platform that enables remote registry content to be digitally signed, ensuring that the content is unaltered and is the most current available version when users access it.
  • Docker image - A Docker image is a file, comprised of multiple layers, used to execute code in a Docker container.
  • Docker Swarm - Docker Swarm is a clustering and scheduling tool for Docker containers.
  • dynamic hashing - Dynamic hashing is a method of hashing, or shortening a string of characters, where the set of shortened characters grows, shrinks and reorganizes to fit the way the data is being accessed.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-driven application - An event-driven application is a computer program that is written to respond to actions generated by the user or the system.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • EVO:SDDC (EVO:RACK) - EVO:RACK is the development codename for EVO:SDDC, an enterprise-level, expandable rack-mounted hyper-converged infrastructure appliance from VMware.
  • functional requirements - Functional requirements are the desired operations of a program, or system as defined in software development and systems engineering.
  • Git - Git is a free and open source distributed code management and version control system that is distributed under the GNU General Public License version 2.
  • Google Kubernetes Engine (GKE) - Google Kubernetes Engine (GKE) is a management and orchestration system for Docker containers and container clusters that run within Google's public cloud services.
  • hands-off infrastructure management - Hands-off infrastructure management is the remote, automated administration of server, storage and network resources.
  • hardware security - Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system.
  • HashiCorp - HashiCorp is a software company that provides a suite of modular DevOps infrastructure provisioning and management products.
  • hyper-hybrid cloud - A hyper-hybrid cloud is a complex distributed environment involving multiple and diverse interconnected public and private clouds, often from multiple providers.
  • HyperGrid - HyperGrid is a cloud computing provider that offers Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and application management services.
  • immutable infrastructure - Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.
  • incremental shift left testing - Incremental shift left testing is a widely adopted method that starts testing earlier in the development cycle – shifting it to the left on the timeline -- and breaks complex development down into smaller pieces that build upon each other.
  • infrastructure as code - Infrastructure as code (IaC) is an approach to software development that treats physical compute, storage and network fabric resources as web services and allows apps to run where they are best suited, based on cost and performance data.
  • IT automation - IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.
  • IT monitoring - IT monitoring is the process to gather metrics about the operations of an IT environment's hardware and software to ensure everything functions as expected to support applications and services.
  • IT operations - IT operations are the processes and services administered by an organization’s information technology (IT) department.
  • IT operations management (ITOM) - IT operations management (ITOM) is the administrative area involving technology infrastructure components and the requirements of individual applications, services, storage, networking and connectivity elements within an organization.
  • IT performance management (information technology performance management) - IT performance management includes purchasing decisions, the standardization of IT equipment and guidance on capital and human resources.
  • IT service delivery - IT service delivery is the manner in which a corporation provides information technology access to users throughout an application's lifecycle.
  • IT systems management - Systems management is the administration of the information technology systems in an enterprise data center.
  • IT/OT convergence - IT/OT convergence is the integration of information technology (IT) systems used for data-centric computing with operational technology (OT) systems used to monitor events, processes and devices and make adjustments in enterprise and industrial operations.
  • ITSM (IT Service Management) - IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use information technology (IT).
  • Kubernetes Node - A Kubernetes Node is a logical collection of IT resources that supports one or more containers.
  • Kubernetes Operators - A Kubernetes Operator is a method for application deployment that extends the capabilities of Kubernetes to manage more complex, stateful workloads.
  • Kubernetes volume - A Kubernetes volume is a directory that contains data accessible to containers in a given Pod in the orchestration and scheduling platform.
  • lift and shift - Lift and shift is a strategy for moving an application or operation from one environment to another – without redesigning the app.
  • Linkerd - Linkerd is an open-source network proxy developed by Buoyant to be installed as a service mesh.
  • Linux Containers Project - Linux Containers is a project created to provide a distro- and vendor-neutral environment for the development of Linux container technologies.
  • Linux Secure Boot - Linux Secure Boot is a feature in Windows 10 and Windows Server 2016 that allows some Linux distributions to boot under Hyper-V as Generation 2 virtual machines.
  • log management - Log management is the collective processes and policies used to administer and facilitate the generation, transmission, analysis, storage, archiving and ultimate disposal of the large volumes of log data created within an information system.
  • Loggly - Loggly is a cloud-based enterprise log management and analytics tool.
  • LXD (Linux container hypervisor) - LXD is an open source container management extension for Linux Containers (LXC).
  • mean time to detect (MTTD) - Mean time to detect or discover (MTTD), also referred to as mean time to identify (MTTI), is a measure of how long problems exist in an IT deployment before the appropriate parties become aware of them.
  • microservices - Microservices, or microservice architecture, is an approach to application development in which a large application is built as a suite of modular components or services.
  • mobile cloud applications - A mobile cloud application is a software program that is designed to be accessed over the Internet by many types of portable computing devices.
  • Nagios - Nagios is an open source monitoring system for computer systems.
  • native cloud application (NCA) - A native cloud application (NCA) is a program that is designed specifically for a cloud computing architecture.
  • network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
  • new collar jobs - New collar jobs are occupations which focus more on a candidate’s skills during the hiring process, rather than his or her level of education.
  • Open Container Initiative - The Open Container Initiative, formerly known as the Open Container Project, is a Linux Foundation project designed to establish common open standards for container platforms.
  • OpenConfig - OpenConfig is a working group and network communication model that attempts to unify standards in networking management interfaces across vendors.
  • operational efficiency - Operational efficiency is the ability of an organization to reduce waste in time, effort and materials as much as possible, while still producing a high-quality service or product.
  • preventive maintenance - Preventive maintenance is the practice of routinely taking measures in hardware administration that reduces the risk of failures and improves the likelihood of quick recovery in the event that a failure does occur.
  • programmable automation controller (PAC) - Programmable automation controller (PAC) is a term that is loosely used to describe any type of automation controller that incorporates higher-level instructions.
  • remote server management - Remote server management is a market segment that includes products and services that enable IT professionals to monitor and control data centers from offsite.
  • rolling deployment - A rolling deployment is the installation of software updates on one server or server subset at a time, rather than updating all servers or server subsets at the same time.
  • SaltStack - SaltStack, also known as Salt, is a configuration management and orchestration tool.
  • site reliability engineer - Site reliability engineer is a job title for a specialist who works with software developers to ensure that an organization's computing systems are scalable, stable and predictable.
  • software-defined infrastructure control (SDIC) - Software-defined infrastructure control (SDIC) is an analytics-driven approach to balancing the resources that application programs demand in virtual and cloud environments.
  • statistical process control (SPC) - Statistical process control (SPC) is a scientific, data-driven methodology for monitoring, controlling and improving procedures and products.
  • synthetic monitoring - Synthetic monitoring is the use of software to simulate user interaction with a given system rather than simply gathering data about real-world transactions.
  • system operator (sysop) - A sysop is the person who runs a computer server.
  • VM automation - VM automation is the ability for a virtual machine (VM) to perform basic functions and optimize performance on its own or with minimal manual input.
  • VMware vSphere Integrated Containers (VIC) - VMware vSphere Integrated Containers allow an administrator to deploy and manage containers alongside their traditional VMs in vSphere.
  • Windows containers - Windows containers are abstracted, isolated and portable operating environments supported by the Microsoft Windows Server 2016 operating system and managed with tools such as Docker and PowerShell.
  • workload automation - Workload automation is the practice of using software to schedule, initiate, run and manage tasks related to business processes and transactions.
  • zero touch provisioning (ZTP) - Zero touch provisioning (ZTP) is a switch feature that allows the devices to be provisioned and configured automatically, eliminating most of the manual labor involved with adding them to a network.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close