Data storage management Definitions

Search Definitions
  • B

    B2G (Business2Government or Business-to-Government)

    On the Internet, B2G is business-to-government (a variation of the term B2B or business-to-business), the concept that businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web.

  • bricks and mortar

    Bricks and mortar refers to businesses that have physical (rather than virtual or online) presences - in other words, stores (built of physical material such as bricks and mortar) that you can drive to and enter physically to see, touch, and purchase merchandise.

  • business process management (BPM)

    Business process management (BPM) is the discipline of improving a business process from end to end by analyzing it, modelling how it works in different scenarios, executing improvements, monitoring the improved process and continually optimizing it.

  • business process outsourcing (BPO)

    Business process outsourcing, or BPO, is a business practice in which one organization hires another company to perform a process task that the hiring organization requires for its own business to operate successfully.

  • business process reengineering (BPR)

    Business process reengineering (BPR) is an approach to change management in which the related tasks required to obtain a specific business outcome are radically redesigned. An important goal of BPR is to analyze workflows within and between enterprises in order to optimize end-to-end processes and eliminate tasks that do not provide the customer with value.

  • C

    CCO (Corporate or Chief Compliance Officer)

    A Chief Compliance Officer (CCO) is a corporate official in charge of overseeing and managing compliance issues within an organization, ensuring, for example, that a company is complying with regulatory requirements and that the company and its employees are complying with internal policies and procedures. 

  • chief data officer (CDO)

    A chief data officer (CDO) is a C-level executive who is responsible for an organization's data use and data governance.

  • conformance

    In information technology, a state or acts of adherence to a certain specification, standard, or guideline.

  • coopetition (co-opetition)

    Coopetition is a business strategy that uses insights gained from game theory to understand when it is better for competitors to work together. 

  • CVO (chief visionary officer)

    Chief Visionary Officer (CVO) is a new title being used in corporations to differentiate the holder from other corporate executives including the Chief Executive Officer (CEO), the Chief Financial Officer (CFO), the Chief Information Officer (CIO), and the Chief Technology Officer (CTO).

  • D

    data collection

    Data collection is a process for gathering information from different sources. In business, data collection helps organizations answer relevant questions and evaluate possible business outcomes.

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved

  • E

    e-procurement (supplier exchange)

    E-procurement is the business-to-business purchase and sale of supplies and services over the Internet.

  • e-services (electronic services)

    E-services, a business concept developed by Hewlett Packard (HP), is the idea that the World Wide Web is moving beyond e-business and e-commerce (that is, completing sales on the Web) into a new phase where many business services can be provided for a business or consumer using the Web.

  • e-speak

    E-speak is an open software platform designed by HP to facilitate the delivery of e-services (electronic services) over the Internet.

  • e-tailing (electronic retailing)

    E-tailing (less frequently: etailing) is the selling of retail goods on the Internet.

  • EISA (Extended Industry Standard Architecture)

    EISA is a standard bus (computer interconnection) architecture that extends the ISA standard to a 32-bit interface.

  • End User License Agreement (EULA)

    An End User License Agreement (EULA) is a legal contract between a software application author or publisher and the user of that application.

  • enterprise architecture (EA)

    An enterprise architecture (EA) is a conceptual blueprint that defines the structure and operation of an organization.

  • entrepreneur (entrepreneurship)

    An entrepreneur is an individual who identifies a need in the marketplace and works to fulfill it.

  • G

    glocalization

    Glocalization is the concept that in a global market, a product or service is more likely to succeed when it is customized for the locality or culture in which it is sold. For example, the international fast food chain McDonalds illustrates the concept of glocalization by changing their menus to appeal to local palates and customs.

  • Gramm-Leach-Bliley Act (GLBA)

    The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.

  • I

    Information and Content Exchange (ICE)

    Information and Content Exchange (ICE) is an XML-based standard protocol for electronic business-to-business (B2B) asset management.

  • integration server

    An integration server is a computer server used to facilitate interaction between diverse operating systems and applications across internal and external networked computer systems.

  • ISBN (International Standard Book Number)

    The ISBN (International Standard Book Number) is a unique number assigned to a book title by its publisher for tracking and ordering purposes.

  • K

    knowledge

    In information technology, knowledge is, to an enterprise or an individual, the possession of information or the ability to quickly locate it.

  • L

    LOB (line-of-business)

    An LOB (line-of-business) application is one of the set of critical computer applications that are vital to running an enterprise, such as accounting, supply chain management, and resource planning applications.

  • M

    metered services (pay-per-use)

    Metered services (also called pay-per-use) is any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.

  • migration

    In information technology (IT), migration is the process of moving from the use of one operating environment to another operating environment that is, in most cases, thought to be a better one.

  • N

    Napster

    Napster is a controversial application that allows people to share music over the Internet without having to purchase their own copy on CD. After downloading Napster, a user can get access to music recorded in the MP3 format from other users who are online at the same time.

  • net metering

    Net metering is a utility resource usage and payment scheme in which a customer who generates their own power is compensated monetarily.

  • O

    offshore outsourcing

    Offshore outsourcing, a type of business process outsourcing (BPO), is the exporting of IT-related work from the United States and other developed countries to areas of the world where there is both political stability and lower labor costs or tax savings.

  • P

    portal software

    Portal software is a type of development tool used to create a portal (starting point) on a company's intranet so that employees can find a centralized starting place for access to consolidated enterprise-related functions, such as e-mail, customer relationship management (CRM) tools, company information, workgroup systems, and other applications.

  • R

    redact

    To redact is to edit, or prepare for publishing.

  • request for quotation (RFQ)

    A request for quotation (RFQ) is a document that an organization submits to one or more potential suppliers eliciting quotations for a product or service.

  • S

    Safe Harbor

    Safe Harbor is the name of a policy agreement established between the United States Department of Commerce and the European Union in November 2000. The agreement, which regulated the way that U.S. companies could export and handle the personal data of European citizens, was ruled invalid in 2015.

  • Sarbanes-Oxley Act (SOX)

    The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.

  • Section 508

    Section 508, an amendment to the United States Workforce Rehabilitation Act of 1973, is a federal law mandating that all electronic and information technology developed, procured, maintained, or used by the federal government be accessible to people with disabilities.

  • Six Sigma

    Six Sigma is an approach to data-driven management that seeks to improve quality by measuring how many defects there are in a process and systematically eliminating them until there are as close to zero defects as possible.

  • Superdome

    Superdome is a high-end 64-bit, Hewlett-Packard (HP) PA-8600 processor-based UNIX server designed for e-commerce customers using very large databases.

  • synthetic data

    Synthetic data is information that's artificially manufactured rather than generated by real-world events.

  • T

    Tibco

    Tibco makes integration server software for enterprises.

  • V

    vertical portal (vortal)

    Vortal is also short for voice portal.

  • W

    workflow

    Workflow is the series of activities that are necessary to complete a task.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close