Apps, Infrastructure and Operations Definitions
-
P
proof of concept (POC)
A proof of concept (POC) is a demonstration of a product in which work is focused on determining whether an idea can be turned into a reality.
-
prototyping model
The prototyping model is a systems development method in which a prototype is built, tested and then reworked as necessary until an acceptable outcome is achieved from which the complete system or product can be developed.
-
What is a PMO (project management office)?
A project management office (PMO) is a group, agency or department that defines and maintains the standards of project management for a company.
-
What is a project charter? Definition and examples
A project charter is a formal short document stating that a project exists and providing project managers with written authority to begin work.
-
Q
What are quantum coherence and decoherence?
Quantum coherence and decoherence are fundamental indications of how well a system of quantum objects -- atoms or other quantum particles -- maintains its relationships and how reliably the ongoing operation of that quantum system can be predicted over time.
-
What is a quantum logic gate?
A quantum logic gate is a basic quantum device that operates on a small number of quantum bits or qubits.
-
What is qualitative data?
Qualitative data is descriptive information that focuses on concepts and characteristics, rather than numbers and statistics.
-
What is quantum as a service? Definition and top providers
Quantum as a service (QaaS), or quantum computing as a service, is a cloud-based way for organizations to access quantum computing technologies and capabilities more affordably through a third-party provider.
-
What is quantum machine learning? How it works
Quantum machine learning (QML), also called quantum-enhanced machine learning, blends the computing power of quantum systems with the increasing computing demands of evolving machine learning models.
-
R
rainmaker
A rainmaker is an individual who generates an unusually high amount of revenue for an organization by bringing new clients and new business to the company.
-
reshoring
Reshoring is the process of bringing back manufacturing or production operations to their country of origin or a nearby region.
-
resource allocation
Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic planning goals.
-
robotic process automation (RPA)
Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, repeatable tasks.
-
S
Sarbanes-Oxley Act
The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.
-
security audit
A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.
-
SIPOC (suppliers, inputs, process, outputs, customers) diagram
A SIPOC (suppliers, inputs, process, outputs, customers) diagram is a visual tool for documenting a business process from beginning to end prior to implementation.
-
skunkworks project (Skunk Works)
A skunkworks project, also known as Skunk Works, is an innovative undertaking, involving a small group of people, that is outside the normal research and development (R&D) channels within an organization.
-
spatial computing
Spatial computing broadly characterizes the processes and tools used to capture, process and interact with three-dimensional (3D) data.
-
spoliation
Spoliation is the destruction, alteration, or mutilation of evidence that may pertain to legal action. (Continued)
-
standard business reporting (SBR)
Standard business reporting (SBR) is a group of frameworks adopted by governments to promote standardization in reporting business data.
-
steering committee
A steering committee comprises a group of high-ranking IT professionals who provide guidance and strategic direction to an organization or organizational segment.
-
strategic planning
Strategic planning is a process in which an organization's leaders define their vision for the future and identify their organization's goals and objectives.
-
Superdome
Superdome is a high-end 64-bit, Hewlett Packard Enterprise (HPE) PA-8600 processor-based UNIX server designed for e-commerce customers using very large databases.
-
Systems Modeling Language (SysML)
Systems Modeling Language (SysML) helps teams design, develop, test and deploy complex physical systems.
-
What are soft skills?
Soft skills are personal attributes that support situational awareness and enhance an individual's ability to get a job done.
-
What are systems of engagement?
Systems of engagement are decentralized IT components that incorporate technologies such as social media and the cloud to encourage and enable peer interaction.
-
What is a software license?
A software license is a document that provides legally binding guidelines for the use and distribution of software.
-
What is Six Sigma and how does it work?
Six Sigma is a business methodology for quality improvement that measures how many defects there are in a current process and seeks to systematically eliminate them.
-
What is sustainability risk management (SRM)?
Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental, social and governance (ESG) policies.
-
What is synthetic data? Examples, use cases and benefits
Synthetic data is information that's artificially manufactured rather than generated by real-world events.
-
What is the Semantic Web? Definition, history and timeline
The Semantic Web is a vision for linking data across webpages, applications and files.
-
T
technology addiction
Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games, despite the negative consequences to the technology user.
-
transaction
In computing, a transaction is a set of related tasks treated as a single action.
-
What is a cyberthreat hunter (cybersecurity threat analyst)?
A cyberthreat hunter, also called a cybersecurity threat analyst, proactively identifies security incidents that might go undetected using automated security tools such as malware detectors and firewalls.
-
What is transfer learning?
Transfer learning is a machine learning (ML) technique where an already developed ML model is reused in another task.
-
U
Universal Process Notation (UPN)
Universal Process Notation is a method for illustrating the steps in a business process.
-
user experience
User experience (UX) design is the process and practice used to design and implement a product that will provide positive and relevant interactions with users.
-
V
What is value-sensitive design?
Value-sensitive design is a concept that advocates the consideration of human principles and standards when planning technology.
-
What is vertical SaaS?
Vertical SaaS describes a type of software as a service solution created for a specific industry, such as retail, financial services, insurance, healthcare or manufacturing.
-
W
workflow
Workflow is the series of activities that are necessary to complete a task.
-
workflow management
Workflow management is the discipline of creating, documenting, monitoring and improving upon the series of steps, or workflow, that is required to complete a specific task.
-
Y
Yammer
Yammer is a private microblogging and collaboration platform for enterprise social networking. Unlike public social media platforms such as Twitter,Yammer only allows members to connect with other members who belong to the same email domain.