Browse Definitions :

Software asset management

Terms related to software management, including definitions about licensing and words and phrases about software lifecycle management and software asset management.

SHR - YEL

  • shrink wrap license - A shrink wrap license is an end user agreement (EULA) that is enclosed with software in plastic-wrapped packaging.
  • site reliability engineering (SRE) - Site reliability engineering (SRE) is the application of scripting and automation to IT operations tasks such as maintenance and support.
  • SOA governance - SOA governance refers to the processes used to oversee and control the adoption and implementation of service-oriented architecture (SOA) in accordance with recognized practices, principles and government regulations.
  • SOA networking - SOA networking is the use of the service-oriented architecture (SOA) model to enhance the capabilities of networks that use Web services.
  • SOA registry - An SOA registry is a resource that provides controlled access to data necessary for governance of SOA (service-oriented architecture) projects.
  • SOA repository - An SOA repository is a database containing the software and metadata that constitute an SOA registry.
  • softlifting - Softlifting is a common type of software piracy in which a legally licensed software program is installed or copied in violation of its licensing agreement.
  • Software as a Service (SaaS) - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
  • software package - A software package is an assemblage of files and information about those files.
  • software resilience testing - Software resilience testing is a method of software testing that focuses on ensuring that applications will perform well in real-life or chaotic conditions.
  • stack overflow - A stack overflow is an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available.
  • standard operating environment (SOE) - Standard operating environments (SOE) simplify desktop deployment and network administration within an organization.
  • streaming application - A streaming application is a program that has its necessary components downloaded as needed instead of being installed ahead of time on a computer.
  • support-driven development - Support-driven development is a strategy used by developers to create products that fit the needs of customers by designing them based on direct customer feedback.
  • systems integrator - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
  • Testing as a Service (TaaS) - Testing as a Service (TaaS) is an outsourcing model in which testing activities associated with some of an organization’s business activities are performed by a service provider rather than employees.
  • troubleshooting - Troubleshooting is a systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
  • turnkey cloud - A turnkey cloud is a product that includes pre-tested and certified packages of software and/or hardware and storage that a cloud provider or enterprise can deploy quickly.
  • turnkey solution provider - A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration.
  • vertical scalability (scaling up) - Vertical scalability is the ability to increase the capacity of existing hardware or software by adding resources - for example, adding processing power to a server to make it faster.
  • virtual address - A virtual address is a binary number in virtual memory that enables a process to use a location in primary storage (also called main memory) independently of other processes, and to use more space than actually exists in primary storage.
  • virtual browser - A virtual browser is a browser that is logically isolated from the underlying computer's operating system (OS).
  • virtual floppy disk - A virtual floppy disk is an alternative to the traditional floppy that exists as a file rather than a physical medium.
  • VMware AirWatch Secure Content Locker - VMware's Secure Content Locker is a tool within the company's AirWatch mobile device management product suite that enables secure data access and collaboration for on-site and remote workers.
  • VMware Horizon Suite - VMware Horizon Suite is a collection of products and technologies designed to help information technology (IT) administrators deliver desktops and applications and secure data on a variety of endpoint devices.
  • WebOps (Web operations) - WebOps, short for Web operations, is the area of IT systems management that deals with the complexities of Web-based applications and the systems that support them.
  • Windows Process Activation Service (WPAS) - Windows Process Activation Service (WAS) is a tool for managing worker processes that contain applications that host Windows Communication Foundation (WCF) services.
  • Windows To Go - Windows To Go is a feature of the Windows 8 Enterprise operating system that allows it to be copied to a portable USB storage device.
  • WS-Policy (Web Services Policy Framework specifications) - WS-Policy is an abbreviation for the Web Services Policy specifications, members of the core Web Services architecture specifications.
  • WSTx (Web Services Transactions) - WSTx (Web Services Transaction) is a set of XML markup specifications designed to permit the use of open, standard protocols for secure, reliable transactions across the Web.
  • WYSIWYP (what you see is what you print) - WYSIWYP (pronounced wizzy-whip and standing for what you see is what you print) is the ability of an application program, such as a word processor, to generate print versions of content that match what the user sees on the screen.
  • Yellowdog Updater, Modified (YUM) - Yellowdog Update, Modified (YUM) is a program that manages installation, updates and removal for Red Hat package manager (RPM) systems.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close