Browse Definitions :

IT operations

Terms related to the processes and services implemented and managed by an organization’s information technology (IT) department. Topics covered include systems management, configuration management, API management and DevOps, as well as real-time performance monitoring and management.

INV - ODM

  • inventory turns (inventory turnover) - Inventory turns, also referred to as inventory turnover and inventory turnover ratio, are a popular measurement used in inventory management to assess operational and supply chain efficiency.
  • inverse-square law - The inverse-square law is a principle that expresses the way radiant energy propagates through space.
  • invitation to tender (ITT) - An invitation to tender (ITT) is the initial step in competitive tendering, in which suppliers and contractors are invited to provide offers for supply or service contracts.
  • invoice - An invoice is a document listing billed goods and/or services that a provider presents to a customer.
  • IP core (intellectual property core) - An IP (intellectual property) core is a block of logic or data that is used in making a field programmable gate array (FPGA) or application-specific integrated circuit (ASIC) for a product.
  • IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
  • IRQ (interrupt request) - An IRQ (interrupt request) value is an assigned location where the computer can expect a particular device to interrupt it when the device sends the computer signals about its operation.
  • ISV (independent software vendor) - An ISV (independent software vendor) makes and sells software products that run on one or more computer hardware or operating system (OS) platforms.
  • IT asset disposition (ITAD) - IT asset disposition (ITAD) is an industry term and practice built around reusing, recycling, repairing or disposing of unwanted IT equipment in a safe and environmentally responsible way.
  • IT asset lifecycle - The IT asset lifecycle is the stages that an organization’s information technology asset goes through during the time span of its ownership.
  • IT asset management (ITAM) - IT asset management (ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.
  • IT automation - IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.
  • IT budget (information technology budget) - IT budget encompasses the money spent on information technology systems and services.
  • IT financial management - IT financial management is the oversight of expenditures required to deliver IT products and services.
  • IT innovation - IT (information technology) innovation in an enterprise is about using technology in new ways, where the result is a more efficient organization and an improved alignment between technology initiatives and business goals.
  • IT monitoring - IT monitoring is the process to gather metrics about the operations of an IT environment's hardware and software to ensure everything functions as expected to support applications and services.
  • IT operations - IT operations is the overarching term for the processes and services administered by an organization's information technology (IT) department.
  • IT operations management (ITOM) - IT operations management (ITOM) is the administrative area involving technology infrastructure components and the requirements of individual applications, services, storage, networking and connectivity elements within an organization.
  • IT performance management (information technology performance management) - IT performance management includes purchasing decisions, the standardization of IT equipment and guidance on capital and human resources.
  • IT procurement - IT procurement is the series of activities and procedures necessary to acquire information technology products or services.
  • IT service delivery - IT service delivery is the manner in which a corporation provides information technology access to users throughout an application's lifecycle.
  • IT4IT - IT4IT is a reference architecture for information technology (IT) management.
  • IT4IT Foundation certification - IT4IT Foundation is a certification for the IT4IT reference architecture.
  • ITIL (Information Technology Infrastructure Library) - ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance and overall lifecycle of IT services within a business.
  • ITSM (IT Service Management) - IT service management (ITSM) is a general term that describes a strategic approach to design, deliver, manage and improve the way businesses use information technology (IT).
  • joystick - In computers, a joystick is a cursor control device used in computer games and assistive technology.
  • kill switch - A kill switch in an IT context is a mechanism used to shut down or disable a device or program.
  • Kindle Fire - Kindle Fire is a low-priced tablet computer from Amazon.
  • Kubernetes - Kubernetes, also referred to as K8s, is an open source system used to manage Linux Containers across private, public and hybrid cloud environments.
  • Kubernetes Node - A Kubernetes Node is a logical collection of IT resources that supports one or more containers.
  • Kubernetes Operators - A Kubernetes Operator is a method for application deployment that extends the capabilities of Kubernetes to manage more complex, stateful workloads.
  • Kubernetes volume - A Kubernetes volume is a directory that contains data accessible to containers in a given Pod in the orchestration and scheduling platform.
  • L1 and L2 - L1 and L2 are levels of cache memory in a computer.
  • laser - A laser is a coherent and focused beam of photons; coherent, in this context, means that it is all one wavelength, unlike ordinary light which showers on us in many wavelengths.
  • LCD (Liquid Crystal Display) - LCD (Liquid Crystal Display) is a type of flat panel display which uses liquid crystals in its primary form of operation.
  • lead time (in purchasing/procurement) - In procurement, lead time includes the first effort to initiate procurement of goods or services up to the time of their arrival.
  • letter of intent - A letter of intent (LOI) is a document outlining the general plans of an agreement between two or more parties before a legal agreement is finalized.
  • lift and shift - Lift and shift is a strategy for moving an application or operation from one environment to another – without redesigning the app.
  • limitation of liability clause - A limitation of liability clause is the section in a service-level agreement (SLA) that specifies the amounts and types of damages that each party will be obliged to provide to the other in particular circumstances.
  • Linkerd - Linkerd is an open-source network proxy developed by Buoyant to be installed as a service mesh.
  • Linux Containers Project - Linux Containers is a project created to provide a distro- and vendor-neutral environment for the development of Linux container technologies.
  • Linux Secure Boot - Linux Secure Boot is a feature in Windows 10 and Windows Server 2016 that allows some Linux distributions to boot under Hyper-V as Generation 2 virtual machines.
  • Liquidware - Liquidware is a company that provides monitoring and management software for physical, virtual and cloud desktop deployments.
  • list price - The list price is the stated value for which something is offered for sale through a particular channel such as a showroom, a retail store, a catalog or a retail, wholesale or distributor website.
  • lithium polymer battery (LiPo) - A lithium-polymer battery (LiPo) is a rechargeable battery that, in the case of true LiPo, uses solid polymer for the electrolyte and lithium for one of the electrodes.
  • load balancing - Load balancing is a technique used to distribute workloads uniformly across servers or other compute resources to optimize network efficiency, reliability and capacity.
  • LOB (line of business) - An LOB (line-of-business) application is one of the set of critical computer applications that are vital to running an enterprise, such as accounting, supply chain management, and resource planning applications.
  • log management - Log management is the collective processes and policies used to administer and facilitate the generation, transmission, analysis, storage, archiving and ultimate disposal of the large volumes of log data created within an information system.
  • Loggly - Loggly is a cloud-based enterprise log management and analytics tool.
  • logical AND symbol - For a practical application, see logic gate.
  • logical partition (LPAR) - A logical partition (LPAR) is the division of a computer's processor s, memory, and storage into multiple sets of resources so that each set of resources can be operated independently with its own operating system instance and application s.
  • loose coupling - Loose coupling is a method of interconnecting the components in a system or network so that those components, also called elements, depend on each other to the least extent practicable.
  • LXD (Linux container hypervisor) - LXD is an open source container management extension for Linux Containers (LXC).
  • magnetic stripe reader (magstripe reader) - A magnetic stripe reader, also called a magstripe reader, is a hardware device that reads the information encoded in the magnetic stripe located on the back of a plastic badge.
  • managed detection and response (MDR) - Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization.
  • managed service provider (MSP) - A managed service provider (MSP) is a third-party company that remotely manages a customer's information technology (IT) infrastructure and end-user systems.
  • manufacturer's suggested retail price (MSRP) - Manufacturer’s suggested retail price (MSRP) is the price that the maker of a product recommends for it in customer-facing retail stores.
  • market distortion - Market distortion is the lack of free and open competition in a market, whether through intentional actions or prevailing market conditions.
  • mean time to detect (MTTD) - Mean time to detect or discover (MTTD), also referred to as mean time to identify (MTTI), is a measure of how long problems exist in an IT deployment before the appropriate parties become aware of them.
  • megahertz (MHz) - The megahertz, abbreviated MHz, is a unit of alternating current (AC) or electromagnetic (EM) wave frequency equal to one million hertz (1,000,000 Hz).
  • memorandum of understanding (MOU) - A memorandum of understanding (MOU) is a formal agreement that outlines plans for a common line of action between two or more parties.
  • memory mirroring - Memory mirroring is the division of memory on a server into two channels.
  • memory read error - A memory read error is a malfunction that occurs when data is being accessed from memory for use by a program, or when a value read from RAM fails to match an expected value.
  • memristor - A memristor is a type of resistor in which the flow of electrical current in an electronic circuit is determined by the amount of charge that has previously flowed through it.
  • metal-oxide semiconductor field-effect transistor (MOSFET) - The metal-oxide semiconductor field-effect transistor (MOSFET, pronounced MAWS-feht) is the most common type of field-effect transistor (FET).
  • mezzanine - Mezzanine is a term used to describe the stacking of computer component cards into a single card that then plugs into the computer bus or data path.
  • mickey - The mickey, in a computing context, is a unit for the smallest detectable movement of a mouse.
  • micron - The micron, officially obsolete as a term of measurement, is sometimes used by microchip and wiring manufacturers in place of micrometer, one-millionth of a meter.
  • microservices - Microservices, or microservices architecture, is an approach to application development in which a large application is built from modular components or services.
  • Microsoft Azure monitoring tools - Azure monitoring tools are software meant to assist in the different aspects of cloud infrastructure management and monitoring, centering around Microsoft's cloud computing platform, Azure.
  • Mini-ITX - Mini-ITX is a compact motherboard configuration designed to support relatively low-cost computers in small spaces such as in automobiles, set-top box es, and network devices.
  • minicomputer - A minicomputer, a term no longer much used, is a computer of a size intermediate between a microcomputer and a mainframe.
  • mobile cloud applications - A mobile cloud application is a software program that is designed to be accessed over the Internet by many types of portable computing devices.
  • ModelOps (model operations) - ModelOps (model operations) is a holistic approach to building analytics models that can quickly progress from the lab to production.
  • monthly recurring revenue (MRR) - Monthly recurring revenue (MRR) is income a company can reliably anticipate every 30 days and one of the key metrics for channel partner companies.
  • motherboard - A motherboard is the main printed circuit board (PCB) in a computer.
  • mount - In computers, to mount is to make a group of files in a file system structure accessible to a user or user group.
  • MPP (massively parallel processing) - MPP (massively parallel processing) is the coordinated processing of a program by multiple processors that work on different parts of the program, with each processor using its own operating system and memory.
  • MTBF (mean time between failures) - MTBF (mean time between failures) is a measure of how reliable a hardware product or component is.
  • MultiMediaCard (MMC) - A MultiMediaCard (MMC) is a tiny memory card that uses flash memory to make storage portable among various devices, such as car navigation systems, cellular phones, eBooks, PDAs, smartphones, and digital cameras, music players, and video camcorders, and personal computers.
  • multiprogramming - Multiprogramming is a rudimentary form of parallel processing in which several programs run at the same time on a uniprocessor system.
  • multisourcing (multi-sourcing) - Multisourcing (multi-sourcing) is an approach to outsourcing in which IT operations and technology infrastructure are contracted to a number of vendors, usually in combination with some internally provided elements of information technology.
  • Nagios - Nagios is an open source monitoring system for computer systems.
  • nanochip - A nanochip is an integrated circuit (IC) that is so small, in physical terms, that individual particles of matter play major roles.
  • nanocomputer - A nanocomputer is a computer whose physical dimensions are microscopic.
  • nanofabrication - Nanofabrication is the design and manufacture of devices with dimensions measured in nanometers.
  • nanomachine (nanite) - A nanomachine, also called a nanite, is a mechanical or electromechanical device whose dimensions are measured in nanometers (millionths of a millimeter, or units of 10 -9 meter).
  • nanotransistor - A nanotransistor is a transistor - the component that acts as an electronic signal switch or amplifier - that is near the scale of a billionth of a meter (or nanometer) in size.
  • nanotube (carbon nanotube) - A carbon nanotube (CNT) is a miniature cylindrical carbon structure that has hexagonal graphite molecules attached at the edges.
  • nearshore outsourcing - Nearshore outsourcing is the practice of getting work done or services performed by people in neighboring countries rather than an organization's country.
  • nematic liquid crystal - A nematic liquid crystal is a transparent or translucent liquid that causes the polarization (that is, the focusing in a plane) of light waves to change as the waves pass through the liquid.
  • net price - The net price is the value at which a product or service is sold after all taxes and other costs are added and all discounts subtracted.
  • network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
  • network interface unit (NIU or Network Interface Device) - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • night vision - Night vision is technology that provides users with some vision in total darkness and improved vision in low-light environments.
  • nonrepudiation - Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information.
  • Northbridge - Northbridge is an Intel chipset that communicates with the computer processor and controls interaction with memory, the Peripheral Component Interconnect (PCI) bus, Level 2 cache, and all Accelerated Graphics Port (AGP) activities.
  • NRZ (non-return-to-zero) - NRZ (non-return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by specific and constant DC (direct-current) voltage s.
  • NUMA (non-uniform memory access) - NUMA (non-uniform memory access) is a method of configuring a cluster of microprocessor in a multiprocessing system so that they can share memory locally, improving performance and the ability of the system to be expanded.
  • ODM (original design manufacturer) - An ODM (original design manufacturer) is a company that takes the original specifications of another company or individual and builds the design to the product specifications.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close