Browse Definitions :

Browse Definitions by Alphabet

ISO - WHA

  • ISO 50001 (International Organization for Standardization 50001) - ISO 50001 is a standard for designing, implementing and maintaining an energy management system.
  • ISO 9000 - ISO 9000 is a series of standards, developed and published by the International Organization for Standardization (ISO).
  • ISO date format - The International Organization for Standardization (ISO) date format is a standard way to express a numeric calendar date that eliminates ambiguity.
  • ISO/IEC 17799: Code of Practice for Information Security Management - ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems.
  • ISO/IEC 38500 - ISO/IEC 38500 is an international standard created to guide corporate governance of information technology (IT).
  • ISP (internet service provider) - An ISP (internet service provider) is a company that provides individuals and companies access to the internet and other related services.
  • ISRS (information storage and retrieval system) - An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data.
  • ISSA (Information Systems Security Association) - The Information Systems Security Association, commonly known as ISSA, is an international, nonprofit organization for information security professionals.
  • ISSU (in-service software upgrade) - An ISSU (in-service software upgrade) is a technique for updating software on a network device without taking that device offline and thereby disrupting network services.
  • Istio - Istio is an independent, open source service mesh technology that enables developers to connect, secure, control, observe and run a distributed microservice architecture (MSA), regardless of platform, source or vendor.
  • ISV (independent software vendor) - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • IT as a Service (ITaaS) - IT as a Service (ITaaS) is a technology-delivery method that treats IT (information technology) as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.
  • IT asset - An IT asset is any company-owned information, system or hardware that is used in the course of business activities.
  • IT asset disposition (ITAD) - IT asset disposition (ITAD) is an industry term and practice built around reusing, recycling, repairing or disposing of unwanted IT equipment in a safe and environmentally responsible way.
  • IT asset lifecycle - The IT asset lifecycle is the stages that an organization’s information technology asset goes through during the time span of its ownership.
  • IT asset management (ITAM) - IT asset management (ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.
  • IT audit (information technology audit) - An IT audit is the examination and evaluation of an organization's information technology infrastructure, policies and operations.
  • IT automation - IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.
  • IT blueprint - An IT blueprint, like an architectural blueprint, is a planning tool or document an information technology organization establishes in order to guide its priorities, projects, budgets, staffing and other IT strategy-related initiatives.
  • IT budget (information technology budget) - IT budget encompasses the money spent on information technology systems and services.
  • IT centralization (information technology centralization) - IT centralization (information technology centralization) is the act of concentrating an organization's technology resources under a single entity.
  • IT chargeback / showback - IT chargeback is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
  • IT chargeback system - An IT chargeback system is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
  • IT continuity (information technology continuity) - IT continuity (information technology continuity) is the holistic management of technology systems toward the guarantee that essential business operations will proceed in the event of a major disruption.
  • IT controls - An IT control is a procedure or policy that provides a reasonable assurance that the information technology (IT) used by an organization operates as intended, that data is reliable and that the organization is in compliance with applicable laws and regulations.
  • IT cost structure - IT cost structure is the relationship of different types of costs within a larger IT budget.
  • IT distributor - An IT channel distributor is a business that acts as an intermediary between vendors and value-added resellers (VARs) or system integrators (SIs) in the distribution of software or hardware.
  • IT elasticity - IT elasticity is the ability to adapt an IT infrastructure to seamless changes without hindering or jeopardizing stability, performance, security, governance or compliance protocols.
  • IT financial management - IT financial management is the oversight of expenditures required to deliver IT products and services.
  • IT Governance Institute (ITGI) - The IT Governance Institute (ITGI) is an arm of ISACA that provides research, publications and resources on IT governance and related topics.
  • IT incident management - IT incident management is an area of IT service management (ITSM) wherein the IT team returns a service to normal as quickly as possible after a disruption, in a way that aims to create as little negative impact on the business as possible.
  • IT incident report - An IT incident report is documentation of an event that has disrupted the normal operation of some IT system (or that had the potential to do so) and how that situation was handled.
  • IT innovation - IT (information technology) innovation in an enterprise is about using technology in new ways, where the result is a more efficient organization and an improved alignment between technology initiatives and business goals.
  • IT leadership (information technology leadership) - IT leadership (information technology leadership) refers to the senior management in an organization responsible for driving business strategy via IT infrastructure and applications.
  • IT management - IT management is the process of overseeing all matters related to information technology operations and resources within an IT organization.
  • IT monitoring - IT monitoring is the process to gather metrics about the operations of an IT environment's hardware and software to ensure everything functions as expected to support applications and services.
  • IT operations - IT operations is the overarching term for the processes and services administered by an organization's information technology (IT) department.
  • IT operations analytics (ITOA) - IT operations analytics (ITOA) is the practice of monitoring systems and gathering, processing and interpreting data from various operations sources to guide decisions and predict potential issues.
  • IT operations management (ITOM) - IT operations management (ITOM) is the administrative area involving technology infrastructure components and the requirements of individual applications, services, storage, networking and connectivity elements within an organization.
  • IT organization (information technology organization) - An IT organization (information technology organization) is the department within an organization charged with establishing, monitoring and maintaining information technology systems and services, and with strategic planning around current and future IT initiatives.
  • IT outsourcing strategy - An IT outsourcing strategy is a plan derived from assessing which IT functions are better performed by an IT outsourcing service provider than by an organization's internal IT department.
  • IT performance management (information technology performance management) - IT performance management includes purchasing decisions, the standardization of IT equipment and guidance on capital and human resources.
  • IT prioritization - IT prioritization is the process of initiating IT projects and procedures based on both the immediate and long-term needs of an organization.
  • IT procurement - IT procurement is the series of activities and procedures necessary to acquire information technology products or services.
  • IT productivity - IT productivity is a reference to the relationship between an organization's technology investments and its corresponding efficiency gains, or return on investment.
  • IT project management - Every IT project should begin with two questions: What business problem are we trying to solve? And does everyone agree it's worth the effort to solve it?.
  • IT project manager - An IT project manager is a professional charged with overseeing the process of planning, executing and delegating responsibilities around an organization's information technology (IT) pursuits and goals.
  • IT reseller - An IT reseller is an intermediary entity in the distribution channel that purchases software and/or hardware from the manufacturer or some other entity, such as a wholesaler or a distributor, and sells it to consumers.
  • IT service catalog - An IT service catalog is a list of technology resources and offerings available from the IT service provider within an organization.
  • IT service delivery - IT service delivery is the manner in which a corporation provides information technology access to users throughout an application's lifecycle.
  • IT skills from the last century still in high demand - IT skills related to legacy technologies and products are still in demand and employers are looking to hire.
  • IT skills gap (information technology skills gap) - In human resource management, an information technology (IT) skills gap is a mismatch between the capabilities an employer needs to meet business objectives and what the organization's employees know and can do.
  • IT solution - An information technology (IT) solution is a set of related software programs and/or services that are sold as a single package.
  • IT strategic plan (information technology strategic plan) - An IT strategic plan outlines a company's technology-enabled business management processes that it uses to guide operations and prioritize business goals.
  • IT strategist (information technology strategist) - An IT strategist (information technology strategist) is someone in an organization who is given the responsibility and authority to establish initiatives that affect the organization's IT and business strategy.
  • IT strategy (information technology strategy) - IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.
  • IT Survival Kits - We've gathered a collection of resources to help you explore an IT topic you might not know much about.
  • IT systems management - Systems management is the administration of the information technology (IT) systems in an enterprise network or data center.
  • IT transformation - IT transformation is a complete reassessment and overhaul of an organization's information technology (IT) systems in order to improve the efficiency and delivery in a digital economy.
  • IT4IT - IT4IT is a reference architecture for information technology (IT) management.
  • IT4IT Foundation certification - IT4IT Foundation is a certification for the IT4IT reference architecture.
  • ITAR and EAR compliance - The International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) are two important United States export control laws that affect the manufacturing, sales and distribution of technology.
  • ITCH - ITCH is a direct data-feed interface that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to observe or disseminate information about stock trading activities.
  • item-level RFID (item-level radio frequency identification) - Item-level RFID involves individual unit tagging, as opposed to tagging cartons or pallets of items.
  • iteration - In agile software development, an iteration is a single development cycle, usually measured as one week or two weeks.
  • iterative - In the world of IT and computer programming, the adjective iterative refers to a process where the design of a product or application is improved by repeated review and testing.
  • iterative development - Iterative development is a way of breaking down the software development of a large application into smaller chunks.
  • iterative DNS query - An iterative DNS query is a request for a website name or uniform resource locator (URL) that the domain name system (DNS) server responds to with the IP address from its zone file cache, if possible.
  • ITIL (Information Technology Infrastructure Library) - ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance and overall lifecycle of IT services within a business.
  • ITIL v3 - ITIL v3 is the third version of the Information Technology Infrastructure Library, a globally recognized collection of best practices for managing information technology (IT).
  • ITSM (IT Service Management) - IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use information technology (IT).
  • ITU X.225 (ISO 8327) - ITU X.225 (also known as ISO 8327) is a connection-oriented session layer protocol in the Open Systems Interconnection (OSI) model.
  • iTunes U - iTunes U is a dedicated section of Apple's iTunes Music Store that features educational audio and video files from universities, museums and public media organizations for free download to PCs and mobile devices.
  • Ivanti - Ivanti is a software company that provides IT management products and services, particularly around endpoint computing.
  • technology addiction (internet addiction) - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.
  • The importance of IT frameworks - IT frameworks lay out guidelines, best practices and operating principles to help IT organizations achieve objectives defined in business terms.
  • What is identity and access management? Guide to IAM - Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
  • What is integrated risk management (IRM)? - Integrated risk management (IRM) is a set of coordinated business practices and supporting software tools that contribute to an organization's ability to understand and manage risk holistically across all departments and third-party dependencies.
  • What is iPaaS? Guide to integration platform as a service - This guide explains all about integration platform as a service (iPaaS), a set of automated tools that integrate software applications that are deployed in different environments.
  • What is IT/OT convergence? Everything you need to know - IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.
  • What is the internet of things (IoT)? - The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close