Browse Definitions :

IT operations

Terms related to the processes and services implemented and managed by an organization’s information technology (IT) department. Topics covered include systems management, configuration management, API management and DevOps, as well as real-time performance monitoring and management.

STA - ZOM

  • stale data - In computer processing, if a processor changes the value of an operand and then, at a subsequent time, fetches the operand and obtains the old rather than the new value of the operand, then it is said to have seen stale data.
  • standardization - Standardization is the process of developing, promoting and possibly mandating standards-based and compatible technologies within a given industry.
  • standby power - Standby power is electrical power that a device consumes when not in present use, but plugged in to a source of power and ready to be used.
  • star network - A star network is a local area network (LAN) topology in which all nodes -- personal computers (PCs), workstations or other devices -- are directly connected to a common central computer that is often referred to as a hub.
  • statement of work (SOW) - A statement of work (SOW), in project management, is a document in which a contracting officer or chief procurement officer (CPO) specifies the objectives and deliverables for a particular project or service contract.
  • statistical process control (SPC) - Statistical process control (SPC) is a scientific, data-driven methodology for monitoring, controlling and improving procedures and products.
  • stepping - Stepping is a number used by Intel to identify what level of design change a microprocessor was built to.
  • strategic planning - Strategic planning is a process in which an organization's leaders define their vision for the future and identify their organization's goals and objectives.
  • strategic sourcing - Strategic sourcing is an approach to supply chain management that formalizes the way information is gathered and used so that an organization can leverage its consolidated purchasing power to find the best possible values in the marketplace.
  • strobe - In computer or memory technology, a strobe is a signal that is sent that validates data or other signals on adjacent parallel lines.
  • supercomputer - A supercomputer is a computer that performs at or near the highest operational rate for computers.
  • superconducting quantum interference device - A superconducting quantum interference device (SQUID) is a mechanism used to measure extremely weak signals, such as subtle changes in the human body's electromagnetic energy field.
  • Supplier performance management (SPM) - Supplier performance management (SPM) is a blanket term for any business practice that is designed to manage, measure and analyze the performance of a supplier or suppliers in a network.
  • supplier relationship management (SRM) - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
  • supplier risk management - Supplier risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings that are caused by the organization's supply chain.
  • supply chain - A supply chain is the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product.
  • supply chain execution (SCE) - Supply chain execution (SCE) is the flow of tasks involved in the supply chain, such as order fulfilment, procurement, warehousing and transporting.
  • supply chain management (SCM) - Supply chain management (SCM) is the optimization of a product's creation and flow from raw material sourcing to production, logistics and delivery to the final customer.
  • supply chain risk management (SCRM) - Supply chain risks include cost volatility, material shortages, supplier financial issues and disasters.
  • supply chain visibility (SCV) - Supply chain visibility (SCV) is the ability of parts, components or products in transit to be tracked from manufacturer to final destination.
  • sustainable procurement - Sustainable procurement is the meeting of business needs for materials, goods, utilities and services in an environmentally-friendly, responsible and ethical way.
  • synthetic monitoring - Synthetic monitoring is the use of software to simulate user interactions with a system.
  • Sysprep (System Preparation Tool) - Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.
  • system operator (sysop) - A sysop is the person who runs a computer server.
  • TCO (total cost of ownership) - Total cost of ownership (TCO) is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment.
  • thermal grease (thermal paste or thermal compound) - Thermal grease, also called thermal paste or thermal compound, is a substance used to promote better heat conduction between two surfaces and is commonly used between a microprocessor and a heatsink.
  • thin-film transistor (TFT) - A display screen made with TFT (thin-film transistor) technology is a liquid crystal display (LCD), common in notebook and laptop computers, that has a transistor for each pixel (that is, for each of the tiny elements that control the illumination of your display).
  • thyristor - A thyristor is a four-layer semiconductor device, consisting of alternating P type and N type materials (PNPN).
  • tidal power - Tidal energy is the generation of clean electricity by harnessing potential energy of the shifting water in ocean tides.
  • tier 1 vendor - A tier 1 vendor is one of the largest and most well known in its field -- often enjoying national or international recognition and acceptance.
  • tier 2 vendor - A tier 2 vendor is a smaller and less well-known provider as compared to a tier 1 vendor and is often also limited in its geographic coverage as well.
  • TOLED (transparent organic light-emitting device) - TOLED (transparent organic light-emitting device) is a display technology being developed by the Universal Display Corporation (UDC) that uses transparent electrodes and light emitting materials in an organic light-emitting device (OLED).
  • total benefit of ownership (TBO) - Total benefit of ownership is the sum of measurable and intangible returns that a company receives from investing in assets and/or personnel.
  • touch screen - A touch screen is a computer display screen that is also an input device.
  • tower server - A tower server is a computer intended for use as a server and built in an upright cabinet that stands alone.
  • transistor-to-transistor logic (TTL) - Transistor-transistor logic (TTL) is a digital logic design in which bipolar transistors act on direct-current pulses.
  • traveling-wave tube (TWT) - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.
  • trusted execution environment (TEE) - A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system’s main operating system (OS) to ensure that sensitive data can be stored and managed in a secure environment.
  • Trusted Platform Module (TPM) - A Trusted Platform Module (TPM) is a specialized chip on a device designed to secure hardware with cryptographic keys.
  • turbine - A turbine is a machine that transforms rotational energy from a fluid that is picked up by a rotor system into usable work or energy.
  • turnkey - Turnkey is a product or service that is designed, supplied, built, or installed fully complete and ready to operate.
  • twisted nematic display (TN display) - A twisted nematic (TN) display is a common type of liquid-crystal display (LCD) that consists of a substance called a nematic liquid crystal that is confined between two plates of polarized glass.
  • Unified Extensible Firmware Interface (UEFI) - Unified Extensible Firmware Interface, or UEFI, specifies how a software program connects a computer's firmware to its operating system and attached computing hardware.
  • Universal Naming Convention (UNC) - In a network, the Universal Naming Convention (UNC) is a way to identify a shared file in a computer without having to specify (or know) the storage device it is on.
  • upcharge - An upcharge is an additional fee that is added to a bill after a contract has already been negotiated.
  • value chain - A value chain is a concept describing the full chain of a business's activities in the creation of a product or service -- from the initial reception of materials all the way through its delivery to market, and everything in between.
  • value-added reseller (VAR) - A value-added reseller (VAR) is a company that resells software, hardware, and other products and services that provide value beyond the original order fulfillment.
  • VAX (Virtual Address eXtension) - VAX (Virtual Address eXtension) is an established line of mid-range server computers from the Digital Equipment Corporation (DEC).
  • Vblock (VCE Vblock) - Vblock is VCE’s hyper-converged infrastructure (HCI) product family.
  • VCR (videocassette recorder) - A VCR (videocassette recorder) is an electromechanical device for recording and playing back full-motion audio-visual programming on cassettes containing magnetic tape.
  • VDT (video display terminal, visual display terminal) - VDT (video display terminal, or sometimes visual display terminal) is a term used, especially in ergonomic studies, for the computer display.
  • vectored interrupt - In a computer, a vectored interrupt is an I/O interrupt that tells the part of the computer that handles I/O interrupts at the hardware level that a request for attention from an I/O device has been received and and also identifies the device that sent the request.
  • vendor - A vendor is an individual or company that sells goods or services to somone else in the economic production chain.
  • vendor management system (VMS) - A vendor management system (VMS) is an enterprise software platform that allows companies to control the process of procuring and managing a flexible workforce, including temporary employees, statement-of-work (SOW) employees, and freelance or contract employees.
  • vendor-managed inventory (VMI) - Vendor-managed inventory (VMI) is an inventory management technique in which a supplier of goods, usually the manufacturer, is responsible for optimizing the inventory held by a distributor.
  • vertical interval time code (VITC) - Vertical interval time code (abbreviated VITC and sometimes pronounced VIHT-see) is a timing signal that is part of a video recording.
  • Very Large Scale Integration (VLSI) - VLSI (very large-scale integration) is the current level of computer microchip miniaturization and refers to microchips containing in the hundreds of thousands of transistor s.
  • VHS (Video Home System) - VHS (Video Home System) is a widely-adopted videocassette recording (VCR) technology that was developed by Japan Victor Company (JVC) and put on the market in 1976.
  • virtual keyboard - A virtual keyboard is a computer keyboard that a user operates by typing on or within a wireless- or optical-detectable surface or area rather than by depressing physical keys.
  • VM automation - VM automation is the ability for a virtual machine (VM) to perform basic functions and optimize performance on its own or with minimal manual input.
  • VMware vSphere Integrated Containers (VIC) - VMware vSphere Integrated Containers allow an administrator to deploy and manage containers alongside their traditional VMs in vSphere.
  • VSPEX BLUE - VSPEX™ BLUE is a hyper-converged appliance from EMC Corporation that includes compute, memory and storage resources in a single device.
  • VUCA (volatility, uncertainty, complexity and ambiguity) - VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity -- qualities that make a situation or condition difficult to analyze, respond to or plan for.
  • warranty - Warranties provide customers with legally-ensured service replacement or correction of issues insofar as the warranty stipulates in its conditions, for the duration of its term.
  • Waste Electrical and Electronic Equipment Regulation (WEEE) - Waste Electrical and Electronic Equipment Regulation (WEEE) is a directive in the European Union that designates safe and responsible collection, recycling and recovery procedures for all types of electronic waste.
  • What is configuration management? A comprehensive guide - Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
  • What is container management and why is it important? - Container management refers to a set of practices that govern and maintain containerization software.
  • What is DevOps? The ultimate guide - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • What is IT/OT convergence? Everything you need to know - IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.
  • What is observability? - Observability is a management strategy focused on keeping the most relevant, important and core issues at or near the top of an operations process flow.
  • wholesale price - Wholesale price is the price charged for a product as sold in bulk to large trade or distributor groups as opposed to what is charged to consumers.
  • Wiegand - Wiegand is the trade name for a technology used in card readers and sensors, particularly for access control applications.
  • wind turbine - A wind turbine is a power generating device that is driven by the kinetic energy of the wind.
  • Windows containers - Windows containers are abstracted, isolated and portable operating environments supported by the Microsoft Windows Server 2016 operating system and managed with tools such as Docker and PowerShell.
  • workload - In computing, a workload, typically, is any program or application that runs on any computer.
  • wrap plug - A wrap plug, also known as a loopback plug, is a special plug that can be inserted into a port on a communications device to perform a diagnostic test called a loopback test.
  • WXGA - WXGA, which stands for wide XGA, is a term used in product specifications to describe a display screen that is appropriate for business but is also suitable for watching DVDs.
  • xerography (electrophotography) - Xerography, also known as electrophotography, is a printing and photocopying technique that works on the basis of electrostatic charges.
  • YANG (data modeling language) - YANG is a data modeling language for the NETCONF configuration management protocol.
  • zero-touch provisioning (ZTP) - Zero-touch provisioning (ZTP) is a method of setting up devices that automatically configures the device using a switch feature.
  • zombie server (comatose server) - A zombie server, also known as a comatose server, is one that is plugged in and drawing power but not performing any work and possibly not detectable other than physically.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close