Browse Definitions :

Software asset management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

12 - SHI

  • 12 factor app (twelve-factor app) - Twelve-factor app is a methodology for building distributed applications that run in the cloud and are delivered as a service.
  • add-in - Add-in is a term used, especially by Microsoft, for a software utility or other program that can be added to a primary program.
  • Agile Software Development - In software application development, Agile is a methodology that anticipates the need for flexibility and applies a level of pragmatism into the delivery of the finished product.
  • alarm management - Alarm management is a system for prioritizing, grouping and classifying alerts and event notifications used in supervisory control and data acquisition (SCADA).
  • Amazon EC2 (Elastic Compute Cloud) - Amazon Elastic Compute Cloud is an Amazon Web Services cloud server hosting tool that allows a business to provision resources for public cloud IT projects.
  • app virtualization (application virtualization) - App virtualization (application virtualization) is the separation of an installation of an application from the client computer that is accessing it.
  • applet - An applet (little application) is a small software program that supports a larger application program.
  • application - An application, also referred to as an application program or application software, is a computer software package that performs a specific function directly for an end user or, in some cases, for another application.
  • application awareness - Application awareness is the capacity of a system to maintain information about connected applications to optimize their operation and that of any subsystems that they run or control.
  • application integration (enterprise application integration or EAI) - Application integration (sometimes called enterprise application integration or EAI) is the process of bringing data or a function from one application program together with that of another application program.
  • application lifecycle management (ALM) - Application lifecycle management (ALM) is the supervision of a software application from its initial planning through retirement.
  • application manager (app manager) - An application manager (app manager) is programming for overseeing the installation, patching and updating and perhaps access of software applications.
  • application modernization - Application modernization is the refactoring, re-purposing or consolidation of legacy software programming to align it more closely with current business needs.
  • application monitoring and management (AMM) - Application monitoring and management is the administrative area and associated tools involved with overseeing the operation of business software and ensuring that it functions and performs as expected.
  • asset management - Asset management is a financial service offered by professional firms for the holding, transferring, buying and selling of different types of cash and investments.
  • back-end - Front-end and back-end are terms used to characterize program interfaces and services relative to the initial user of these interfaces and services.
  • batch - In a computer, a batch job is a program that is assigned to the computer to run without further user interaction.
  • batch file - A batch file is a text file that contains a sequence of commands for a computer operating system.
  • beta test - In software development, a beta test is the second phase of software testing in which a sampling of the intended audience tries the product out.
  • binder - In file management, a binder is a software utility that combines two or more files into a single file.
  • business event management - Business event management is the practice of incorporating business logic into labeling events, communicating events and handling events.
  • CAVE (Cave Automatic Virtual Environment) - CAVE (Cave Automatic Virtual Environment) is a virtual reality environment consisting of a cube-shaped room in which the walls, floors and ceilings are projection screens.
  • change control - Change control is a systematic approach to managing all changes made to a product or system.
  • chief integration officer (CIO) - A chief integration officer (CIO) is a corporate executive in charge of ensuring the coordination of all interacting systems within the enterprise and its extended environments.
  • citizen development - Citizen development is a low code approach to software development that allows people to create software programs without needing to know anything about programming languages or how to write code.
  • cloud bursting - Cloud bursting is an application deployment model in which an application normally runs in a private cloud or local data center but can also run in a public cloud when the demand for computing capacity spikes.
  • cloud integrator - A cloud integrator is a product or service that helps a business negotiate the complexities of cloud migrations.
  • cloud services - Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.
  • Compiere - Compiere is a popular open-source system of software applications that provide enterprise resource planning (ERP), customer relationship management (CRM), supply chain management (SCM), tax accounting, and general accounting for the small and medium-size enterprise.
  • DCML (Data Center Markup Language) - DCML (Data Center Markup Language), based on Extensible Markup Language (XML), is a data format and model for exchanging information that describes a data center environment.
  • DevOps as a Service - DevOps as a Service (DaaS) is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team.
  • directory harvest attack (DHA) - A directory harvest attack (DHA) is an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database.
  • Distributed File System Replication (DFSR) - Distributed File System Replication (DFSR) is a replication engine that organizations can use to synchronize folders for servers on network connections that have a limited bandwidth.
  • distributed tracing - Distributed tracing, also called distributed request tracing, is a method for IT and DevOps teams to monitor applications, especially those composed of microservices.
  • dynamic case management (DCM) - Dynamic case management (DCM) is the handling of case-based work through the use of technologies that automate and streamline aspects of each case.
  • e-recruitment (e-recruiting) - E-recruitment is an umbrella term for any electronic-based recruiting and recruitment management activity.
  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • enterprise content management (ECM) - Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.
  • Enterprise Integration Patterns (EIP) - "Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions" is a book of design patterns for enterprise application integration.
  • Enterprise Service Bus (ESB) - An enterprise service bus (ESB) is a middleware tool used to distribute work among connected components of an application.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • Full Packaged Product (FPP) - Full Packaged Product (FPP) is the retail version of a Microsoft licensed product.
  • globbing - Globbing is the process of expanding a non-specific file name containing a wildcard character into a set of specific file names that exist in storage on a computer, server, or network.
  • golden image - A golden image is a template for a virtual machine (VM), virtual desktop, server or hard disk drive.
  • gzip (GNU zip) - Gzip (GNU zip) is a free and open source algorithm for file compression.
  • Hadoop - Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems.
  • health informatics - Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction with health information technology systems to help clinicians provide better healthcare.
  • Health IT (health information technology) - Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of information systems for the healthcare industry.
  • Hewlett Packard Enterprise (HP Enterprise, HPE) - Hewlett Packard Enterprise (HP Enterprise, also known as HPE) is an American multinational company that specializes in business IT (information technology).
  • Hosted CRM - Hosted CRM is an arrangement in which a company outsources some or all of its customer relationship management (CRM) functions to an application service provider (ASP).
  • HP Quality Center - HP Quality Center is Hewlett-Packard’s software quality management product, part of the company’s application lifecycle management software suite.
  • hybrid virus/worm - A hybrid virus/worm is malicious code that combines characteristics of both those types of malware, typically featuring the virus' ability to alter program code with the worm's ability to reside in live memory and to propagate without any action on the part of the user.
  • ISO/IEC 38500 - ISO/IEC 38500 is an international standard created to guide corporate governance of information technology (IT).
  • IT as a Service (ITaaS) - IT as a Service (ITaaS) is a technology-delivery method that treats IT (information technology) as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.
  • IT chargeback system - An IT chargeback system is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
  • IT operations - IT operations are the processes and services administered by an organization’s information technology (IT) department.
  • IT operations analytics (ITOA) - IT operations analytics (ITOA) is the practice of monitoring systems and gathering, processing and interpreting data from various operations sources to guide decisions and predict potential issues.
  • IT operations management (ITOM) - IT operations management (ITOM) is the administrative area involving technology infrastructure components and the requirements of individual applications, services, storage, networking and connectivity elements within an organization.
  • IT/OT convergence - IT/OT convergence is the integration of information technology (IT) systems used for data-centric computing with operational technology (OT) systems used to monitor events, processes and devices and make adjustments in enterprise and industrial operations.
  • JAR file (Java Archive) - A Java Archive, or JAR file, contains all of the various components that make up a self-contained, executable Java application, deployable Java applet or, most commonly, a Java library to which any Java Runtime Environment can link.
  • JAX-WS (Java API for XML Web Services) - Java API for XML Web Services (JAX-WS) is one of a set of Java technologies used to develop Web services.
  • JeOS (just enough operating system) - JeOS (just enough operating system) is a highly customized operating system built for a specific application.
  • log analytics - Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.
  • memory read error - A memory read error is a malfunction that occurs when data is being accessed from memory for use by a program, or when a value read from RAM fails to match an expected value.
  • Microsoft Active Directory Domain Services (AD DS) - Active Directory Domain Services (AD DS) is a server role in Active Directory that allows admins to manage and store information about resources from a network, as well as application data, in a distributed database.
  • Microsoft Azure Active Directory Authentication Library (ADAL) - Microsoft Azure Active Directory Authentication Library (ADAL) is a tool in the .
  • Microsoft Exchange Server 2013 Managed Availability - Microsoft Exchange Server 2013 Managed Availability is a built-in monitoring and recovery platform in Exchange 2013.
  • Microsoft Live Mesh - Live Mesh is a software-plus-services platform from Microsoft that synchronizes data between multiple computers, mobile devices and online services.
  • Microsoft Online Services Sign-In Assistant - The Microsoft Online Services Sign-In Assistant is a software application that provides common sign-on capabilities for a suite of Microsoft online services, such as Office 365.
  • Microsoft System Center 2012 SP1(Microsoft System Center 2012 Service Pack 1) - Microsoft System Center 2012 SP1 is a service pack for System Center 2012 that brings management capabilities and support to Windows 8 and Windows Server 2012 machines.
  • Microsoft Windows 10 Long Term Servicing Branch - Microsoft Windows 10 Long Term Servicing Branch is a licensing structure available for operating system updates in Windows 10 Enterprise.
  • Microsoft Windows PowerShell Web Access (Windows PWA) - Microsoft Windows PowerShell Web Access (PWA) is a feature in Windows Server 2012 that acts as a Windows PowerShell gateway to connect to a remote computer or device in your environment, providing a PowerShell console-like screen in a browser to run cmdlets or scripts to manage a virtualization environment.
  • mobile application manager (MAM) - A mobile application manager is a tool used by network administrators to remotely install, update, remove, audit, and monitor programs installed on smartphones and tablets.
  • nearshore outsourcing - Nearshore outsourcing is the practice of getting work done or services performed by people in neighboring countries rather than in your own country.
  • Netflix Spinnaker - Netflix Spinnaker is an open source, multi-cloud continuous delivery application that can be used to release software updates rapidly and efficiently.
  • NoOps - NoOps (no operations) is the concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there is no need for a dedicated team to manage software in-house.
  • open core model (open core software) - The open core model is a business strategy where a company offers a “core” version of a product with limited features as free and open source (FOSS) software at the same time an add-on commercial version is released as proprietary software.
  • Oracle Unlimited License Agreement (ULA) - An Oracle Unlimited License Agreement (ULA) is an arrangement in which an enterprise pays a single up-front fee to get as many licenses as they want for a specified set of Oracle products over a fixed time frame.
  • package manager or package management system (PMS) - A package manager, also known as a package management system (PMS), is a program used to install, uninstall and manage software packages.
  • PDCA (plan-do-check-act) - PDCA stands for plan-do-check-act, sometimes seen as plan-do-check-adjust.
  • performance management software - Performance management software is designed to improve business performance by spurring employee productivity.
  • Platform as a Service (PaaS) - Platform as a service (PaaS) is a cloud computing model in which a third-party provider delivers hardware and software tools -- usually those needed for application development -- to users over the internet.
  • predictive analytics - Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast activity, behavior and trends.
  • principle of least privilege (POLP) - The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work.
  • Prism - Prism is an application that lets users run web applications in dedicated browser windows.
  • private cloud (internal cloud or corporate cloud) - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • product development (new product development - NPD) - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • Quiz -- Software development - How to take the quiz: - After reading the question, click on the answer that you think is correct to go to the whatis.
  • R/3 Repository - In the R/3 system from SAP, the R/3 Repository is the central place where development components in the ABAP Workbench are stored.
  • remote desktop - Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • Service Data Objects (SDO) - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
  • service-component architecture (SCA) - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • seven wastes - The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS).
  • SharePoint sprawl - SharePoint sprawl occurs when end users create a new site to categorize content that could have been stored in an existing site, or categorize content poorly so it's difficult to find later on.
  • shift-right testing - Shift-right testing is a method of continuously testing software while it is in a post-production environment.

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits an end user to enter one set of login credentials ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

  • RAID controller

    A RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in...

Close