Browse Definitions :

IT operations

Terms related to the processes and services implemented and managed by an organization’s information technology (IT) department. Topics covered include systems management, configuration management, API management and DevOps, as well as real-time performance monitoring and management.

CPE - INS

  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • cryogenics - Cryogenics is the study of material sciences at extremely low temperatures.
  • customer premises equipment (CPE) - Customer premises equipment (CPE) is telecommunications and information technology equipment kept at the customer's physical location rather than on the service provider's premises.
  • CVO (Chief Visionary Officer) - The Chief Visionary Officer (CVO) is a newer title where the holder is expected to have a broad and comprehensive knowledge of all matters related to the business of the organization, as well as the vision required to steer its course into the future.
  • cycle time - Cycle time is the time, usually measured in nanosecond s, between the start of one random access memory (RAM) access to the time when the next access can be started.
  • data access rights - A data access right (DAR) is a permission that has been granted that allows a person or computer program to locate and read digital information at rest.
  • data glove - A data glove is an interactive device, resembling a glove worn on the hand, which facilitates tactile sensing and fine-motion control in robotics and virtual reality.
  • data in use - Data in use is data that is currently being updated, processed, accessed and read by a system.
  • data lineage - Data lineage is the history of data, including where the data has traveled through-out the its existence within an organization.
  • data management as a service (DMaaS) - Data management as a service (DMaaS) is a type of cloud service that provides enterprises with centralized storage for disparate data sources.
  • daughterboard (or daughter board, daughter card, or daughtercard) - A daughterboard (or daughter board, daughter card, or daughtercard) is a circuit board that plugs into and extends the circuitry of another circuit board.
  • Defense Acquisition Regulatory Council (DARC) - The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency, and the National Aeronautics and Space Administration.
  • Defense Contract Management Agency (DCMA) - The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.
  • Dell Technologies Partner Program - The Dell Technologies Partner Program is an international channel partner program that provides partners with business development, sales and marketing resources.
  • design reuse - In information technology, design reuse is the inclusion of previously designed components (blocks of logic or data) in software and hardware.
  • DevOps certification - DevOps certification is a formalized testing program intended to ensure that applicants have achieved an appropriate level of skills and knowledge for working in the converged areas of software development and IT operations.
  • DevOps engineer - A DevOps engineer is an IT professional who works with software developers, system operators and other production IT staff to create and oversee code releases and deployments.
  • Digital Data Storage (DDS, DDS-1, DDS-2, DDS-3, DDS-4) - Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.
  • digital ecosystem - A digital ecosystem is a group of interconnected information technology resources that can function as a unit.
  • digital enterprise - A digital enterprise is an organization that uses technology as a competitive advantage in its internal and external operations.
  • digital projector (digital projection display system) - A digital projector, also called a digital projection display system, is a specialized computer display that projects an enlarged image on a movie screen.
  • digital video - Digital video is audio/visual data in a binary format.
  • digital workspace - A digital workspace is an integrated technology framework that centralizes the management of an enterprise's applications, data and endpoints, allowing employees to collaborate and work remotely.
  • disaggregated server - A disaggregated server is a server that breaks up components and resources into subsystems.
  • distributed applications (distributed apps) - Distributed applications (distributed apps) are applications or software that run on multiple computers within a network at the same time and can be stored on servers or cloud computing platforms.
  • distributed cloud - Distributed cloud is the application of cloud computing technologies to interconnect data and applications served from multiple geographic locations.
  • Docker - Docker is an open source software platform to create, deploy and manage virtualized application containers on a common operating system (OS), with an ecosystem of allied tools.
  • Docker Content Trust - Docker Content Trust is a feature in the Docker containerization platform that enables remote registry content to be digitally signed, ensuring that the content is unaltered and is the most current available version when users access it.
  • Docker image - A Docker image is a file used to execute code in a Docker container.
  • Docker Swarm - Docker Swarm is a clustering and scheduling tool for Docker containers.
  • document reader - A document reader is a device that converts an electronic file or printed matter to a form suitable for use by people with visual impairment.
  • domain controller - A domain controller is a type of server that processes requests for authentication from users within a computer domain.
  • due diligence - Due diligence definition: Due diligence is the process of systematically researching and verifying the accuracy of a particular statement.
  • duty cycle - Duty cycle is the proportion of time during which a component, device, or system is operated.
  • dynamic hashing - Dynamic hashing is a method of hashing, or shortening a string of characters, where the set of shortened characters grows, shrinks and reorganizes to fit the way the data is being accessed.
  • dynamic pricing - The goal of dynamic pricing is to allow a company that sells goods or services over the Internet to adjust prices on the fly in response to market demands.
  • e-bomb (electromagnetic bomb) - An e-bomb (electromagnetic bomb) is a weapon that uses an intense electromagnetic field to create a brief pulse of energy that affects electronic circuitry without harming humans or buildings.
  • e-procurement (supplier exchange) - Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.
  • e-reader (electronic reader) - An e-reader (electronic reader) is a device for reading content, such as e-books, newspapers and documents.
  • electrical power management system (EPMS) - An electrical power management system (EPMS) is an electronic system that provides fine grained information about the flow of power in an electrical power generation system or power substation.
  • electrochemical cell - An electrochemical cell is a device that is essentially a contained chemical reaction that produces an electrical current.
  • electronic paper display (EPD) - An electronic paper display (EPD) is an electrically-charged surface that replicates the look and experience of ink on paper.
  • end effector - In robotics, an end effector is a device or tool that's connected to the end of a robot arm where the hand would be.
  • end of life (EOL) - End of life (EOL), in the context of manufacturing and product lifecycles, is the final stages of a product’s existence.
  • entangled light-emitting diode (ELED) - An entangled LED is a light-emitting diode containing a quantum dot that enables the production of entangled photons (light particles) on demand.
  • EPEAT (Electronic Product Environmental Assessment Tool) - EPEAT (Electronic Product Environmental Assessment Tool) is a ranking system that helps purchasers in the public and private sectors evaluate, compare and select desktop computers, notebooks and monitors based on their environmental attributes.
  • ERP (enterprise resource planning) - ERP, or enterprise resource planning, is software designed to manage and integrate the functions of core business processes like finance, HR, supply chain and inventory management in a single system.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-driven application - An event-driven application is a computer program that is written to respond to actions generated by the user or the system.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • fair and reasonable price - A fair and reasonable price is the price point for a good or service that is fair to both parties involved in the transaction.
  • fair opportunity - Fair opportunity is a requirement that U.
  • fan-in - Fan-in is a term that defines the maximum number of digital inputs that a single logic gate can accept.
  • fan-out - Fan-out is a term that defines the maximum number of digital inputs that the output of a single logic gate can feed.
  • Federal Acquisition Regulation (FAR) - Federal Acquisition Regulation (FAR) is the body of laws that govern the U.
  • feedback loop - A feedback loop is a system where some portion or all of the output produced by the system returns as input, effecting the succeeding processes of that system in some way.
  • fiat money (fiat currency) - A fiat money is a type of currency that is declared legal tender by a government but has no intrinsic or fixed value and is not backed by any tangible asset, such as gold or silver.
  • fiber jumper - A fiber jumper, sometimes called a fiber patch cord is a length of fiber cabling fitted with LC, SC, MTRJ or ST connectors at each end.
  • FinOps (FinOps Foundation) - FinOps (financial operations) is a framework for managing operating expenditures (Opex) in the cloud.
  • firmware - Firmware is programming that's written to a hardware device's non-volatile memory.
  • fiscal year - A fiscal year is the twelve-month period that an organization uses for budgeting, forecasting and reporting.
  • fixed price - A fixed price is a non-negotiable sum charged for a product, service or piece of work.
  • fixed price contract - A fixed-price contract, also known as a lump sum contract, is an agreement between a vendor or seller and a client that stipulates goods and/or services that will be provided and the price that will be paid for them.
  • flip flops (bistable gates) - Flip-flops, also called bistable gates, are digital logic circuits that can be in one of two states.
  • full and open competition - With respect to a contract action, "full and open" competition means that all responsible sources are permitted to compete.
  • fullerene - A fullerene is a pure carbon molecule composed of at least 60 atoms of carbon.
  • functional requirements - Functional requirements are the desired operations of a program, or system as defined in software development and systems engineering.
  • gallium arsenide field-effect transistor (GaAsFET) - A gallium arsenide field-effect transistor (GaAsFET) is a specialized type of field-effect transistor (FET) that is used in amplifier circuits at very-high, ultra-high, and microwave radio frequencies.
  • geo-fencing (geofencing) - Geo-fencing is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries.
  • gigabit interface converter (GBIC) - A gigabit interface converter (GBIC) is a transceiver that converts electric currents (digital highs and lows) to optical signals, and optical signals to digital electric currents.
  • Git - Git is a free and open source distributed code management and version control system that is distributed under the GNU General Public License version 2.
  • GitOps - GitOps is a paradigm designed around Kubernetes to allow developers and IT operations teams to use Git for cluster management and application delivery.
  • Google Kubernetes Engine (GKE) - Google Kubernetes Engine (GKE) is a management and orchestration system for Docker containers and container clusters that run within Google's public cloud services.
  • governmentwide acquisition contract (GWAC) - A governmentwide acquisition contract (GWAC) is a contract between a commercial IT service or product vendor and the U.
  • graphene transistor - A graphene transistor is a nanoscale device based on graphene, a component of graphite with electronic properties far superior to those of silicon.
  • graphics accelerator - A graphics accelerator (a chipset attached to a video board) is a computer microelectronics component to which a computer program can offload the sending and refreshing of images to the display monitor and the computation of special effects common to 2-D and 3-D images.
  • green networking - Green networking is the practice of selecting energy-efficient networking technologies and products, and minimizing resource use whenever possible.
  • green procurement - Green procurement is a continuous commitment to start-to-finish process management with consideration for environmental impact in business activities used to meet needs for materials, goods, utilities and services.
  • hands-off infrastructure management - Hands-off infrastructure management is the remote, automated administration of server, storage and network resources.
  • hardware abstraction layer (HAL) - In computers, a hardware abstraction layer (HAL) is a layer of programming that allows a computer operating system to interact with a hardware device at a general or abstract level rather than at a detailed hardware level.
  • hardware security - Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system.
  • HashiCorp - HashiCorp is a software company that provides a suite of modular DevOps infrastructure provisioning and management products.
  • hexadecimal - Hexadecimal is a numbering system with base 16.
  • hot swap - A hot swap describes the act of removing components from or plugging them into a computer system while the power remains switched on.
  • HPE Partner Ready Program - The HPE Partner Ready Program is a global partner program that rewards and supports Hewlett Packard Enterprise's channel alliances.
  • hyper-converged appliance - A hyper-converged appliance is a hardware device that provides multiple data center management technologies within a single box.
  • hyper-hybrid cloud - A hyper-hybrid cloud is a complex distributed environment involving multiple and diverse interconnected public and private clouds, often from multiple providers.
  • Hyper-Threading - Hyper-Threading is a technology used by some Intel microprocessors that allows a single microprocessor to act like two separate processors to the operating system and the application programs that use it.
  • HyperGrid - HyperGrid is a cloud computing provider that offers Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and application management services.
  • IBM Power9 Server - IBM Power9 Server is a series of high-end enterprise-level servers, part of the company’s Power Systems line.
  • imagesetter - An imagesetter is a high resolution output device that can transfer electronic text and graphics directly to film, plates, or photo-sensitive paper.
  • immutable infrastructure - Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.
  • impact sourcing - Impact sourcing is a service provision model in which jobs or tasks are outsourced to economically disadvantaged areas as a means of improving the situation of people living there.
  • incremental shift left testing - Incremental shift left testing is a widely adopted method that starts testing earlier in the development cycle – shifting it to the left on the timeline -- and breaks complex development down into smaller pieces that build upon each other.
  • indemnification - In service level agreements (SLAs) and other legal contracts such as end-user license agreements (EULAs), indemnification is the part of an agreement that provides for one party to bear the monetary costs, either directly or by reimbursement, for losses incurred by a second party.
  • information asymmetry - Information asymmetry is an imbalance between the knowledge of relevant factors and details between two negotiating parties.
  • infrastructure as code - Infrastructure as code, also referred to as IaC, is an IT practice that codifies and manages underlying IT infrastructure as software.
  • inkjet printer - An inkjet printer is a computer peripheral that produces hard copy by spraying ink onto paper.
  • insourcing - Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close