Browse Definitions :

IT operations

Terms related to the processes and services implemented and managed by an organization’s information technology (IT) department. Topics covered include systems management, configuration management, API management and DevOps, as well as real-time performance monitoring and management.
  • Seebeck effect - The Seebeck effect is a phenomenon in which a temperature difference between two dissimilar electrical conductors or semiconductors produces a voltage difference between the two substances.
  • serial communications interface (SCI) - A serial communications interface (SCI) is a device that enables the serial exchange of data -- that is, one bit at a time -- between a microprocessor and peripherals, such as printers, external drives, scanners and mice.
  • serial peripheral interface (SPI) - A serial peripheral interface (SPI) is an interface commonly used in computers and embedded systems to facilitate short-distance communication between a microcontroller and one or more peripheral integrated circuits (ICs).
  • server hardware degradation - Server hardware degradation is the gradual breakdown of the physical parts of a server.
  • service assurance (SA) - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management guidance in communications networks, media services and end-user applications.
  • service level indicator - A service level indicator (SLI) is a metric that indicates what measure of performance a customer is receiving at a given time.
  • service mesh - A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.
  • service virtualization - Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.
  • service-level agreement (SLA) - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
  • ServiceNow - ServiceNow is a software company that provides a cloud-based, AI-driven platform for automating multiple management workflows in enterprises.
  • seven wastes - The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS).
  • shared services - Shared services is a delivery model organizations use to consolidate similar business functions into a single unit that supports the entire organization.
  • shift-left testing - Shift-left testing is a software testing approach in which the code is tested in the earlier stages of the software development lifecycle (SDLC).
  • sidecar proxy - A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of an application.
  • SIPOC (suppliers, inputs, process, outputs, customers) diagram - A SIPOC (suppliers, inputs, process, outputs, customers) diagram is a visual tool for documenting a business process from beginning to end prior to implementation.
  • site reliability engineer - Site reliability engineer is a job title for a specialist who works with software developers to ensure that an organization's computing systems are scalable, stable and predictable.
  • SMB (small and medium-sized business or small and midsize business) - SMB is an abbreviation for a small and medium-sized business, sometimes called a small and midsize business.
  • software license - A software license is a document that provides legally binding guidelines for the use and distribution of software.
  • sound card - A sound card is a computer component responsible for generating and recording audio.
  • standard operating procedure (SOP) - A standard operating procedure is a set of step-by-step instructions for performing a routine activity.
  • standardization - Standardization is the process of developing, promoting and possibly mandating standards-based and compatible technologies and processes within an industry.
  • star network - A star network is a local area network (LAN) topology in which all nodes -- personal computers (PCs), workstations or other devices -- are directly connected to a common central computer that is often referred to as a hub.
  • statement of work (SOW) - A statement of work (SOW), in project management, is a document in which a contracting officer or chief procurement officer (CPO) specifies the objectives and deliverables for a particular project or service contract.
  • STONITH (Shoot The Other Node In The Head) - STONITH (Shoot The Other Node In The Head) is a Linux service for maintaining the integrity of nodes in a high-availability (HA) cluster.
  • strategic management - Strategic management is the ongoing planning, monitoring, analysis and assessment of all necessities an organization needs to meet its goals and objectives.
  • strategic planning - Strategic planning is a process in which an organization's leaders define their vision for the future and identify their organization's goals and objectives.
  • super app - A super app is a mobile or web application that combines multiple services into one platform.
  • supercomputer - A supercomputer is a computer that performs at or near the highest operational rate for computers.
  • supplier relationship management (SRM) - Supplier relationship management (SRM) is a systematic approach to evaluating and partnering with vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success, and developing strategies to improve their performance.
  • supply chain - A supply chain is the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product.
  • supply chain execution (SCE) - Supply chain execution (SCE) is the flow of tasks involved in the supply chain, such as order fulfilment, procurement, warehousing and transporting.
  • supply chain management (SCM) - Supply chain management (SCM) is the optimization of a product's creation and flow from raw material sourcing to production, logistics and delivery to the final customer.
  • supply chain risk management (SCRM) - Supply chain risk management (SCRM) is the coordinated efforts of an organization to help identify, monitor, detect and mitigate threats to supply chain continuity and profitability.
  • supply chain visibility (SCV) - Supply chain visibility (SCV) is the ability of parts, components or products in transit to be tracked from manufacturer to final destination.
  • sustainability risk management (SRM) - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental, social and governance (ESG).
  • synthetic monitoring - Synthetic monitoring is the use of software to simulate user interactions with a system.
  • Sysprep (System Preparation Tool) - Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.
  • System Restore (Windows) - System Restore is a Microsoft Windows utility designed to protect and revert the operating system (OS) to a previous state.
  • systems operator (sysop) - In IT, a systems operator (sysop) is a person who runs computer servers and other devices on a daily basis in a data center.
  • TCO (total cost of ownership) - Total cost of ownership (TCO) is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment.
  • TCPView - TCPView is a Windows network monitoring utility that shows a graphical representation of all currently active TCP and UDP endpoints on a system.
  • technical debt - Technical debt -- or tech debt -- is the implied cost incurred when businesses do not fix problems that will affect them in the future.
  • template - A template is a form, mold or pattern used as a guide to make something.
  • Terraform - HashiCorp Terraform is an infrastructure as code (IaC) software tool that allows DevOps teams to automate infrastructure provisioning using reusable, shareable, human-readable configuration files.
  • thyristor - A thyristor is a four-layer semiconductor device, consisting of alternating P-type and N-type materials (PNPN).
  • tier 1 vendor - A tier 1 vendor is one of the largest and most well known in its field -- often enjoying national or international recognition and acceptance.
  • tier 2 vendor - A tier 2 vendor is a smaller and less well-known provider as compared to a tier 1 vendor and is often also limited in its geographic coverage as well.
  • touch screen - A touch screen is an electronic display screen that is also an input device.
  • transaction - In computing, a transaction is a set of related tasks treated as a single action.
  • trusted execution environment (TEE) - A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system's main operating system (OS).
  • Trusted Platform Module (TPM) - A Trusted Platform Module (TPM) is a specialized chip on a device designed to secure hardware with cryptographic keys.
  • turbine - A turbine is a machine that plays a key role in transforming fluid or air energy into usable work or electricity.
  • Unified Extensible Firmware Interface (UEFI) - Unified Extensible Firmware Interface, or UEFI, specifies how a software program connects a computer's firmware to its operating system and attached computing hardware.
  • Universal Naming Convention (UNC) - The Universal Naming Convention (UNC) is a standard for naming resources -- such as files and devices -- that are shared by computers on a network.
  • value chain - A value chain is a concept describing the full chain of a business's activities in creating a product or service -- from initial receipt of materials through its delivery to market.
  • value proposition - A value proposition is a statement that clearly identifies the benefits a company's products and services will deliver to its customers.
  • value-added reseller (VAR) - A value-added reseller (VAR) is a company that resells software, hardware, and other products and services that provide value beyond the original order fulfillment.
  • Vblock (VCE Vblock) - Vblock (VCE Vblock) is a family of converged infrastructure (CI) systems from Dell EMC that integrate advanced compute, network and storage technologies from three industry leaders: VMware, Cisco and Dell EMC.
  • vendor - A vendor is an individual or company that sells goods or services to somone else in the economic production chain.
  • vendor management system (VMS) - A vendor management system (VMS) is an enterprise software platform that helps companies control the process of procuring and managing a flexible workforce.
  • vendor-managed inventory (VMI) - Vendor-managed inventory (VMI) is an inventory management technique in which the supplier of goods, usually the manufacturer, is responsible for optimizing the inventory a distributor holds.
  • virtual CPU (vCPU) - A virtual CPU (vCPU) is the processor of a virtual machine (VM).
  • Virtual Machine Disk format (VMDK) - VMware Virtual Machine Disk format (VMDK) is a format specification for virtual machine (VM) disk image files.
  • VRAM (video RAM) - VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.
  • VUCA (volatility, uncertainty, complexity and ambiguity) - VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity -- qualities that make a situation or condition difficult to analyze, respond to or plan for.
  • Waste Electrical and Electronic Equipment (WEEE) Directive - The Waste Electrical and Electronic Equipment (WEEE) Directive is a legislative act that the European Union adopted to address the growing amounts of e-waste that come from electrical and electronic equipment (EEE) at the end of its life.
  • What are microservices? Everything you need to know - Microservices, or microservices architecture, is an approach to the design and implementation of enterprise applications in which a large application is built from modular components or services.
  • What is configuration management? A comprehensive guide - Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
  • What is container management and why is it important? - Container management refers to a set of practices that govern and maintain containerization software.
  • What is DevOps? Meaning, methodology and guide - The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
  • What is IT/OT convergence? Everything you need to know - IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.
  • What is observability? A beginner's guide - Observability is a management strategy focused on keeping the most relevant, important and core issues at or near the top of an operations process flow.
  • Wiegand - Wiegand is the trade name for a technology used in card readers and sensors, particularly for access control applications.
  • Windows Admin Center - Windows Admin Center (WAC), formerly Microsoft Project Honolulu, is a browser-based management tool from Microsoft that allows administrators to manage Windows servers and clusters from a centralized, graphical user interface.
  • Windows containers - Windows containers provide abstracted, isolated, lightweight and portable operating environments for application development on a single system.
  • Windows event log - The Windows event log is a detailed record of system, security and application notifications stored by the Windows operating system that is used by administrators to diagnose system problems and predict future issues.
  • Windows Server Client Access License (CAL) - A Windows Server Client Access License (CAL) is a license that gives a user or device the right to access services, such as printing or access to a file share, from a server running the Windows Server operating system (OS).
  • Windows Sysinternals - Windows Sysinternals is a collection of 70 freeware utilities that Microsoft offers IT administrators and developers to help them monitor, manage, diagnose and troubleshoot Windows systems and their applications.
  • WinZip - WinZip is a software product used to archive, compress and encrypt files in a variety of archive formats for more efficient storage and distribution.
  • workload - In computing, a workload is typically any program or application that runs on a computer.
  • WXGA - WXGA, which stands for wide XGA, is a term used in product specifications to describe a display screen that is appropriate for business but is also suitable for watching DVDs.
  • zero-touch provisioning (ZTP) - Zero-touch provisioning (ZTP) is a method of setting up devices that automatically configures the device using a switch feature.
Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close