Browse Definitions :

IT operations

Terms related to the processes and services implemented and managed by an organization’s information technology (IT) department. Topics covered include systems management, configuration management, API management and DevOps, as well as real-time performance monitoring and management.

327 - COT

  • 3270 (Information Display System) - The 3270 Information Display System, a product from IBM, was, prior to the arrival of the PC, the way that almost the entire corporate world interfaced with a computer.
  • A-weighted decibels (dBA, or dBa, or dB(a)) - A-weighted decibels, abbreviated dBA, or dBa, or dB(a), are an expression of the relative loudness of sounds in air as perceived by the human ear.
  • ABC analysis (Pareto analysis) - ABC analysis, also known as Pareto analysis, is a method used to categorize something according to its importance or value in a given context.
  • abend (abnormal end) - An abend (abnormal end) is an unexpected or abnormal termination of an application or operating system that results from a problem with the software.
  • accountability - Accountability means being held responsible or answerable for one's actions (or perhaps lack of action where one should have been taken).
  • acquisition plan - An acquisition plan, in the context of procurement, is a business document specifying all relevant considerations for the processes involved with acquiring goods, services or other organizations.
  • adapter - An adapter is a physical device that allows one hardware or electronic interface to be adapted (accommodated without loss of function) to another hardware or electronic interface.
  • advanced shipping notice (ASN) - Advanced shipping notice (ASN) is a document that provides detailed information about a pending delivery.
  • aerogel - Aerogel is a translucent, synthetic solid-state substance with extremely low density and excellent thermal insulating properties.
  • algorithm - An algorithm is a procedure used for solving a problem or performing a computation.
  • Alibaba Holding Group Limited - Alibaba Group Holding Limited is a Chinese business conglomerate that runs one of the largest online e-commerce sites in the world, Alibaba.
  • Amazon - Amazon (Amazon.
  • Amazon Elastic Container Registry (Amazon ECR) - Amazon Elastic Container Registry (Amazon ECR) is an Amazon Web Service (AWS) product that stores, manages and deploys Docker images, which are managed clusters of Amazon EC2 instances.
  • Amazon Elastic Container Service (Amazon ECS) - Amazon Elastic Container Service (ECS) is a cloud computing service in Amazon Web Services (AWS) that manages containers and allows developers to run applications in the cloud without having to configure an environment for the code to run in.
  • AMD-V (AMD virtualization) - AMD-V (AMD virtualization) is a set of hardware extensions for the X86 processor architecture.
  • Ansible - Ansible is an open source IT configuration management (CM) and automation platform, provided by Red Hat.
  • Apple - Apple is a prominent hardware and software company best known for its series of personal computers, the iPod and its innovative marketing strategies for its products.
  • Apple Authorized Service Provider (Apple AASP) - An Apple Authorized Service Provider (AASP) is a business that provides repair services for Apple products.
  • application containerization (app containerization) - Application containerization is an OS-level virtualization method used to deploy and run distributed applications without launching an entire virtual machine for each app.
  • application lifecycle management (ALM) - Application lifecycle management (ALM) is an integrated system of people, tools and processes that supervise a software application from its initial planning and development, through testing and maintenance, and into decommissioning and retirement.
  • application monitoring and management (AMM) - Application monitoring and management is the administrative area and associated tools involved with overseeing the operation of business software and ensuring that it functions and performs as expected.
  • Application Performance Index (Apdex) - Application Performance Index, also known as Apdex, is an open standard intended to simplify reports of application performance.
  • application rationalization (AR) - Application rationalization is the process of identifying which business applications should be kept, replaced, retired or consolidated across an organization to improve business operations.
  • AS/400 (IBM iSeries, AS/400e, eServer iSeries/400) - The AS/400 - formally renamed the 'eServer iSeries/400,' but still commonly known as AS/400 - is a middle-size server designed for small businesses and departments in large enterprises and now redesigned so that it will work well in distributed networks.
  • ASIC (application-specific integrated circuit) - An ASIC (application-specific integrated circuit) is a microchip designed for a special application, such as a particular kind of transmission protocol or a hand-held computer.
  • ASSP (application-specific standard product) - In computers, an ASSP (application-specific standard product) is a semiconductor device integrated circuit (IC) product that is dedicated to a specific application market and sold to more than one user (and thus, "standard").
  • ATX - ATX is an industry-wide specification for a desktop computer's motherboard.
  • authorized service provider (ASP) - An authorized service provider (ASP) is an organization that a product manufacturer has deemed qualified to service products covered under the manufacturer's warranty.
  • automated testing - Automated testing is a process that validates if software is functioning appropriately and meeting requirements before it is released into production.
  • automotive IT - Automotive IT is any hardware or software designed to augment and support the experience of operating a motor vehicle.
  • AV (audio/video) - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment system and related product descriptions and reviews.
  • Avaya - Avaya is an American technology company that specializes in business communications services, such as unified communications (UC) and contact center (CC).
  • AWS CodeDeploy (Amazon Web Services CodeDeploy) - AWS CodeDeploy is a service that automates code deployments to Elastic Compute Cloud (EC2) and on-premises servers.
  • backdoor selling - Backdoor selling is the unscrupulous practice of seeking information beyond what is publicly available as a means of gaining a competitive advantage for a contract or sale.
  • bang-bang (bang-bang control) - Bang-bang control is a type of control system that mechanically or electronically turns something on or off when a desired target (setpoint) has been reached.
  • barcode reader (POS scanner, bar code reader, price scanner) - A barcode reader, also called a price scanner or point-of-sale (POS) scanner, is a hand-held or stationary input device used to capture and read information contained in a bar code.
  • big-endian and little-endian - Endianness is a term that describes the order in which a sequence of bytes is stored in computer memory.
  • bill of lading (BoL, B/L) - A bill of lading (also seen as B/L and BoL) is a document given to a shipper by the carrier that details the shipment and serves as a means of transferring the title of goods.
  • bill of materials (BOM) - A bill of materials (BOM) is a comprehensive inventory of the raw materials, assemblies, subassemblies, parts and components, as well as the quantities of each, needed to manufacture a product.
  • binary-coded decimal - Binary-coded decimal is a system of writing numerals that assigns a four-digit binary code to each digit 0 through 9 in a decimal (base 10) number.
  • bit (binary digit) - A bit (binary digit) is the smallest unit of data that a computer can process and store.
  • board support package - A board support package (BSP) is essential code code for a given computer hardware device that will make that device work with the computer's OS (operating system).
  • BOOT (build, own, operate and transfer) - BOOT (build, own, operate, transfer) is a project funding model based on a financial agreement between a private contractor and a public organization.
  • boot sector - A boot sector is a specially assigned section of a storage drive containing the files required to start the operating system (OS) and other bootable programs such as antivirus programs, drive partitioning software, backup tools and diagnostic disks.
  • brain-computer interface (BCI) - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
  • British thermal unit (Btu) - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
  • build or buy (make or buy) - Build or buy, often expressed as make or buy, is the fundamental decision as to whether to develop something in-house or purchase it from an external supplier.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • bus network - A bus network is a local area network (LAN) topology in which each node -- a workstation or other device -- is connected to a main cable or link called a bus.
  • business case - A business case is a written or verbal value proposition that is intended to educate a decision maker and convince them to take some kind of action.
  • business impact analysis (BIA) - A business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.
  • business process mapping - Business process mapping is the visual display of the steps within a business process showing how it's done from start to finish.
  • cache coherence - In a shared memory multiprocessor with a separate cache memory for each processor, it is possible to have many copies of any one instruction operand : one copy in the main memory and one in each cache memory.
  • canonical name (CNAME) - A canonical name (CNAME) is a type of Domain Name System (DNS) database record that indicates that a domain name is the nickname or alias for another domain name.
  • Certificate of Competency - In defense contracting, a Certificate of Competency states that the holder is authorized to receive and perform on a specific government contract.
  • certification - In information technology as in other fields such as teaching, accounting, and acupuncture, certification is a formal process of making certain that an individual is qualified in terms of particular knowledge or skills.
  • change control - Change control is a systematic approach to managing all changes made to a product or system.
  • channel partner rules of engagement (ROE) - Channel partner rules of engagement are a component of the sales relationship between an IT vendor and its channel partner community.
  • chaos engineering - Chaos engineering is the process of testing a distributed computing system to ensure that it can withstand unexpected disruptions.
  • chassis - A chassis (pronounced TCHA-see or CHA-see) is the physical frame or structure of an automobile, an airplane, a desktop computer, or other multi-component device.
  • ChatOps - ChatOps is the use of chat clients, chatbots and real-time communication tools to facilitate how software development and operation tasks are communicated and executed.
  • chief procurement officer (CPO) - The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and services made by the organization.
  • chip - "Chip" is short for microchip, the incredibly complex yet tiny modules that store computer memory or provide logic circuitry for microprocessors.
  • chipset - A chipset is a group of integrated circuits (microchips) that can be used together to serve a single function and are therefore manufactured and sold as a unit.
  • Chromebook - Google Chromebook is a thin client laptop that is configured with the Chrome operating system (Chrome OS).
  • clean room - A clean room (or cleanroom) is an enclosed space in which airborne particulates, contaminants, and pollutants are kept within strict limits.
  • clickwrap agreement (clickthrough agreement) - A clickwrap agreement, also known as a click through, shrink-wrap, or sign-in-wrap, is an online agreement in which the user signifies his or her acceptance by clicking a button or checking a box that states “I agree.
  • Client Access Server (CAS) - The Client Access Server (CAS) is a server role that handles all client connections to Exchange Server 2010 and Exchange 2013.
  • cloud application - A cloud application, or cloud app, is a software program where cloud-based and local components work together.
  • cloud application performance management (cloud APM) - Cloud application performance management (cloud APM) is the process of monitoring resources that support software application performance in public cloud, private cloud and hybrid cloud environments, and ultimately taking actions to resolve issues and maintain optimal performance.
  • cloud broker - A cloud broker is a third-party individual or business that acts as an intermediary between the purchaser of a cloud computing service and the sellers of that service.
  • cloud orchestration (cloud orchestrator) - Cloud orchestration is the use of programming technology to manage the interconnections and interactions among workloads on public and private cloud infrastructure.
  • cloud-native application - A cloud-native application is a program that is designed for a cloud computing architecture.
  • cluster - In a computer system, a cluster is a group of servers and other resources that act like a single system and enable high availability and, in some cases, load balancing and parallel processing.
  • CMDB (configuration management database) - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • collaborative robot (cobot) - A collaborative robot, also known as a cobot, is a robot that is capable of learning multiple tasks so it can assist human beings.
  • commodity - A commodity is a type of widely-available product that is not markedly dissimilar from one unit to another.
  • commodity hardware - Commodity hardware, in an IT context, is a device or device component that is relatively inexpensive, widely available and more or less interchangeable with other hardware of its type.
  • compact fluorescent light bulb (CFL) - A compact fluorescent light bulb (CFL) is a fluorescent light bulb that has been compressed into the size of a standard-issue incandescent light bulb.
  • compatibility - Compatibility is the capacity for two systems to work together without having to be altered to do so.
  • complementary metal-oxide semiconductor (CMOS) - A complementary metal-oxide semiconductor (CMOS) is the semiconductor technology used in most of today's integrated circuits, also known as chips or microchips.
  • computer instruction - A computer instruction is an order given to a computer processor by a computer program.
  • computerized maintenance management system (CMMS) - A computerized maintenance management system (CMMS) is software that helps operations and maintenance staff identify and track the status of maintenance tasks and availability of replacement parts.
  • configuration file - A configuration file, often shortened to config file, defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context.
  • configuration service provider (CSP) - A configuration service provider (CSP) is a component of the Windows client operating system that shows IT professionals potential device configuration choices and allows them to apply the settings across multiple Windows OSes.
  • Containers as a Service (CaaS) - Containers as a service (CaaS) is a cloud service that allows software developers to upload, organize, run, scale, manage and stop containers by using a provider's API calls or a web portal interface.
  • context awareness - Context awareness is the ability of a system or system component to gather information about its environment at any given time and adapt behaviors accordingly.
  • continual service improvement - Continual service improvement is a method to identify and execute opportunities to make IT processes and services better, and to objectively measure the effects of these efforts over time.
  • continuous delivery (CD) - Continuous delivery (CD) is an approach for software delivery in which development teams produce and test code in short but continuous cycles, usually with high degrees of automation.
  • continuous deployment - Continuous deployment is a strategy for software releases wherein any code commit that passes the automated testing phase is automatically released into the production environment, making changes that are visible to the software's users.
  • contract delivery date (CDD) - A contract delivery date (CDD) is the date of delivery required by a contract.
  • contract management software - Contract management software is a program or series of related programs for storing and managing legal agreements such as contracts with vendors, leases and licensing agreements.
  • contract theory - Contract theory is the study of how people and organizations develop legal agreements in situations with uncertain conditions, unknown factors and information asymmetry.
  • contracting officer - A contracting officer is an individual entrusted by an organization with the authority to enter into, administer, renew or terminate contract s, along with related determinations and findings.
  • conventional memory - DOS memory, sometimes referred to as conventional memory, refers to the memory -addressing scheme used in the original IBM and compatible PCs.
  • coopetition (co-opetition) - Coopetition is a business strategy that uses insights gained from game theory to understand when it is better for competitors to work together.
  • coprocessor - A coprocessor is a special set of circuits in a microprocessor chip that is designed to manipulate numbers or perform some other specialized function more quickly than the basic microprocessor circuits could perform the same task.
  • corporate wellness coach (health coach) - A corporate wellness coach (health coach) is a professional who is brought into a corporate or office environment to help employees maintain and improve their health and wellness goals.
  • cost price - A cost price includes all outlays that are required for production, including property costs, materials, power, research and development, testing, worker wages and anything else that must be paid for.
  • COTS, MOTS, GOTS, and NOTS - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close