Browse Definitions :

Project management

Terms related to project management, including definitions about project management methodologies and tools.

WEB - ZER

  • Web Standards Project (WaSP) - The Web Standards Project (WaSP) is a grass roots effort to encourage the main browser makers to create a standard implementation of the Hypertext Markup Language (HTML) and other Web standards and recommendations of the World Wide Consortium (W3C).
  • webinar - A webinar is an educational, informative or instructional presentation that is made available online, usually as video or audio with slides.
  • WebOps (Web operations) - WebOps, short for Web operations, is the area of IT systems management that deals with the complexities of Web-based applications and the systems that support them.
  • what if scenario analysis (WISA) - A business can use what if scenario analysis (WISA) to see how a given outcome, such as project costs, might be affected by changes in particular variables, such as the late delivery of supplies or the unavailability of key personnel.
  • What is DevOps? The ultimate guide - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • white box testing - White box testing is a software testing methodology in which the code structure is known and understood by the tester.
  • Windows Workflow Foundation (WF or WinWF) - Windows Workflow Foundation (WF or WinWF) is Microsoft's programming model for building workflow-enabled applications in the Windows operating system.
  • work breakdown structure (WBS) - A work breakdown structure (WBS) is a chart in which the critical work elements, called tasks, of a project are illustrated to portray their relationships to each other and to the project as a whole.
  • zero-sum game - A zero-sum game is a situation in which the potential gain for players remains constant.

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close