Browse Definitions :

Browse Definitions by Alphabet

ITA - WHA

  • ITAR and EAR compliance - The International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) are two important U.
  • ITCH - ITCH is a direct data-feed interface that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to observe or disseminate information about stock trading activities.
  • iteration - In agile software development, an iteration is a single development cycle, usually measured as one week or two weeks.
  • iterative - In the world of IT and computer programming, the adjective iterative refers to a process where the design of a product or application is improved by repeated review and testing.
  • iterative development - Iterative development is a way of breaking down the software development of a large application into smaller chunks.
  • iterative DNS query - An iterative DNS query is a request for a website name or URL.
  • ITIL (Information Technology Infrastructure Library) - ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance and overall lifecycle of IT services within a business.
  • ITIL v3 - ITIL v3 is the third version of the Information Technology Infrastructure Library, a globally recognized collection of best practices for managing information technology (IT).
  • ITSM (IT Service Management) - IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use information technology (IT).
  • iTunes U - iTunes U is a dedicated section of Apple's iTunes Music Store that features educational audio and video files from universities, museums and public media organizations for free download to PCs and mobile devices.
  • Ivanti - Ivanti is a software company that provides IT management products and services, particularly around endpoint computing.
  • technology addiction (internet addiction) - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.
  • The importance of IT frameworks - IT frameworks lay out guidelines, best practices and operating principles to help IT organizations achieve objectives defined in business terms.
  • What is identity and access management? Guide to IAM - Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
  • What is integrated risk management (IRM)? - Integrated risk management (IRM) is a set of coordinated business practices and supporting software tools that contribute to an organization's ability to understand and manage risk holistically across all departments and third-party dependencies.
  • What is iPaaS? Guide to integration platform as a service - This guide explains all about integration platform as a service (iPaaS), a set of automated tools that integrate software applications that are deployed in different environments.
  • What is IT/OT convergence? Everything you need to know - IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.
  • What is the internet of things (IoT)? - The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • Common Vulnerability Scoring System (CVSS)

    The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in ...

  • Dridex malware

    Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials ...

  • crypto wallet (cryptocurrency wallet)

    A crypto wallet (cryptocurrency wallet) is software or hardware that enables users to store and use cryptocurrency.

CIO
  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

  • outsourcing

    Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services...

  • chief operating officer (COO)

    A chief operating officer (COO) is the corporate executive who oversees ongoing business operations within the company.

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

  • sales pipeline

    A sales pipeline is a visual representation of sales prospects and where they are in the purchasing process.

  • market basket analysis

    Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing...

Close