Browse Definitions :

IT service management & procurement

Terms related to the activities and procedures necessary to acquire information technology (IT) products and services.

  • value chain - A value chain is a concept describing the full chain of a business's activities in the creation of a product or service -- from the initial reception of materials all the way through its delivery to market, and everything in between.
  • value-added reseller (VAR) - A value-added reseller (VAR) is a company that resells software, hardware, and other products and services that provide value beyond the original order fulfillment.
  • vendor - A vendor is an individual or company that sells goods or services to somone else in the economic production chain.
  • vendor management system (VMS) - A vendor management system (VMS) is an enterprise software platform that allows companies to control the process of procuring and managing a flexible workforce, including temporary employees, statement-of-work (SOW) employees, and freelance or contract employees.
  • vendor-managed inventory (VMI) - Vendor-managed inventory (VMI) is an inventory management technique in which a supplier of goods, usually the manufacturer, is responsible for optimizing the inventory held by a distributor.
Networking
  • remote infrastructure management

    Remote infrastructure management, or RIM, is a comprehensive approach to handling and overseeing an organization's IT ...

  • port address translation (PAT)

    Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 ...

  • network fabric

    'Network fabric' is a general term used to describe underlying data network infrastructure as a whole.

Security
  • multifactor authentication

    Multifactor authentication (MFA) is an account login process that requires multiple methods of authentication from independent ...

  • cyber insurance

    Cyber insurance, also called cyber liability insurance or cybersecurity insurance, is a contract an entity can purchase to help ...

  • Protected Extensible Authentication Protocol (PEAP)

    Protected Extensible Authentication Protocol (PEAP) is a security protocol commonly used to protect wireless networks.

CIO
  • digital innovation

    Digital innovation is the adoption of modern digital technologies by a business.

  • business goals

    A business goal is an endpoint, accomplishment or target an organization wants to achieve in the short term or long term.

  • vertical SaaS (software as a service)

    Vertical SaaS describes a type of software as a service solution created for a specific industry, such as retail, financial ...

HRSoftware
  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • skill-based learning

    Skill-based learning develops students through hands-on practice and real-world application.

  • gamification

    Gamification is a strategy that integrates entertaining and immersive gaming elements into nongame contexts to enhance engagement...

Customer Experience
  • virtual assistant (AI assistant)

    A virtual assistant, also called an AI assistant or digital assistant, is an application program that understands natural ...

  • Microsoft Dynamics 365

    Dynamics 365 is a cloud-based portfolio of business applications from Microsoft that are designed to help organizations improve ...

  • Salesforce Commerce Cloud

    Salesforce Commerce Cloud is a cloud-based suite of products that enable e-commerce businesses to set up e-commerce sites, drive ...

Close