14 July 2019

🧱IT: Cluster/Clustering (Definitions)

"Technology that enables you to create a hot spare. That is a server that is actually running and can take over immediately. This technology enables you to mirror an entire server to another computer." (Owen Williams, "MCSE TestPrep: SQL Server 6.5 Design and Implementation", 1998)

"The use of multiple computers to provide increased reliability, capacity, and management capabilities." (Microsoft Corporation, "SQL Server 7.0 System Administration Training Kit", 1999)

"Grouping data together on the same disk page to improve retrieval performance." (Jan L Harrington, "Relational Database Dessign: Clearly Explained" 2nd Ed., 2002)

"Any collection of distinct computers that are connected and used as a parallel computer, or to form a redundant system for higher availability. The computers in a cluster are not specialized to cluster computing and could, in principle, be used in isolation as standalone computers. In other words, the components making up the cluster, both the computers and the networks connecting them, are not custom-built for use in the cluster." (Beverly A Sanders, "Patterns for Parallel Programming", 2004)

"Connecting two or more computers in such a way that they behave like a single computer to an application or client. Clustering is used for parallel processing, load balancing, and fault tolerance." (Allan Hirt et al, "Microsoft SQL Server 2000 High Availability", 2004)

[server cluster:] "The type of Windows Clustering that provides availability only. It is a collection of nodes that allow resources to be failed over to another node in the event of a problem. SQL Server 2000 failover clustering is installed and configured on top of a server cluster." (Allan Hirt et al, "Microsoft SQL Server 2000 High Availability", 2004)

"A group of computers linked via a LAN and working together to form the equivalent of a single computer." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed., 2011)

[failover cluster:] "A group of servers that are in one location and that are networked together for the purpose of providing live backup in case one of the servers fails." (Microsoft, "SQL Server 2012 Glossary", 2012)

"A set of computers with distributed memory communicating over a high-speed interconnect. The individual computers are often called nodes." (Michael McCool et al, "Structured Parallel Programming", 2012)

"A group of servers connected by a network and configured in such a way that if the primary server fails, a secondary server takes over." (IBM, "Informix Servers 12.1", 2014)

"A cluster is a set of servers configured to function together. Servers sometimes have differentiated functions and sometimes they do not." (Dan Sullivan, "NoSQL for Mere Mortals®", 2015)

"A collection of complete systems that work together to provide a single, unified computing capability." (Sybase, "Open Server Server-Library/C Reference Manual", 2019)

[failover clustering:] "A network of two or more interconnected servers that redirects an overloaded or failed resource to maintain system availability." (Microsoft Technet)

🧱IT: Web 2.0 (Definitions)

"A phrase used loosely by the Web development community to refer to a perceived “second generation” of Web technologies and applications. Wikis, folksonomies, gaming, podcasting, blogging, and so on, are all considered Web 2.0 applications." (J P Getty Trust, "Introduction to Metadata" 2nd Ed., 2008)

"A trend in the use of World Wide Web technology and web design that aims to facilitate creativity, information sharing, and, most notably, collaboration among users." (Tilak Mitra et al, "SOA Governance", 2008)

"describes a second generation of the World Wide Web that is focused on the ability for people to collaborate and share information online. Web 2.0 basically refers to the transition from static HTML web pages to a more dynamic Web that is more organized and is based on serving web applications to users." (Gina C O'Connor & V K Narayanan, "Encyclopedia of Technology and Innovation Management", 2010)

"The name attributed to two-way Internet capability for users to both upload and download content." (Ruth C Clark & Richard E Mayer, "e-Learning and the Science of Instruction", 2011)

"The second generation of Internet-based services that let people collaborate and create information online in perceived new ways - such as social networking sites, wikis, and blogs." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed, 2011)

"a second generation of Internet-based tools and applications that facilitate communication, collaboration, connectivity, sharing, etc." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed. , 2012)

"Web advancements between 2003 and 2010, where social networking activities and tools greatly improved. Also referred to as the Social Web." (Mike Harwood, "Internet Security: How to Defend Against Attackers on the Web" 2nd Ed., 2015)

"The name attributed to two-way Internet capability for users to both upload and download content." (Ruth C Clark & Richard E Mayer, "e-Learning and the Science of Instruction", 2016)

"The evolution of the Web from a collection of hyperlinked content pages to a platform for human collaboration and system development and delivery." (Gartner)

"was a phrase first coined in 2004 to describe the second stage of the World Wide Web’s development. These developments include the evolution from static web pages to dynamic, interactive and user-generated content and the growth of social media. Examples of web 2.0 range from online banking to remote email access." (Accenture)

13 July 2019

🧱IT: Service Level Agreement [SLA] (Definitions)

"A signed agreement of system service requirements between two parties (such as your company and an ASP or between your department and end users) that defines the guidelines, response times, actions, and so on, that will be adhered to for the life of the agreement." (Allan Hirt et al, "Microsoft SQL Server 2000 High Availability", 2004)

"A contract with a service provider, be it an internal IT organization, application service provider, or outsourcer, that specifies discrete reliability and availability requirements for an outsourced system. An SLA might also include other requirements such as support of certain technology standards or data volumes. An outsourcer’s failure to adhere to the terms laid out in an SLA could result in financial penalties." (Evan Levy & Jill Dyché, "Customer Data Integration", 2006)

"A formal negotiated agreement between two parties. It is a contract that exists between customers and their service provider, or between service providers. It records the common understanding about services, priorities, responsibilities, guarantees, and so on, with the main purpose to agree on the level of service." (Tilak Mitra et al, "SOA Governance", 2008)

"An agreement between a customer and a product or service provider that defines conditions under which the provider will offer support or additional services to the customer, and what level of services will be offered under each of those conditions." (Steven Haines, "The Product Manager's Desk Reference", 2008)

"An agreement between a service provider and a service recipient that formally defines the levels of service that are to be provided." (David G Hill, "Data Protection: Governance, Risk Management, and Compliance", 2009)

"A formal negotiated agreement between two parties that usually records the common understanding about priorities, responsibilities, and warranties, with the main purpose of agreeing on the quality of the service. For example, an SLA may specify the levels of availability, serviceability, performance, operation, or other attributes of the service (such as billing and even penalties in the case of violations of the SLA)." (David Lyle & John G Schmidt, "Lean Integration", 2010)

"A written legal contract between a service provider and client wherein the service provider guarantees a minimum level of service." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed., 2011)

"A contracted guarantee of service delivery for a program, transaction, service, or workload." (Craig S Mullins, "Database Administration", 2012)

"The part of a contract between two parties that outlines the delivery of services within defined timeframes." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"A statement to customers or the user community about the service the IT department will provide. It can refer to a variety of metrics, such as performance, up-time, resolution time, and so on." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed., 2012)

"An agreement between an IT service provider and a customer to provide a specific level of reliability for a service. It stipulates performance expectations such as minimum uptime and maximum downtime levels. Many SLAs include monetary penalties if the IT service provider does not provide the service as promised." (Darril Gibson, "Effective Help Desk Specialist Skills", 2014)

"The service or maintenance contract that states the explicit levels of support, response time windows or ranges, escalation procedures in the event of a persistent problem, and possible penalties for nonconformance in the event the vendor does not meet its contractual obligations." (Robert F Smallwood, "Information Governance: Concepts, Strategies, and Best Practices", 2014)

"A contract for formally defined services. Particular aspects of the service (scope, quality, responsibilities) are agreed between the service provider and the service user. A common feature of an SLA is a contracted delivery time of the service or performance." (Thomas C Wilson, "Value and Capital Management", 2015)

"A portion of a service contract that promises specific levels of service." (Weiss, "Auditing IT Infrastructures for Compliance" 2nd Ed, 2015)

"A contract between a service provider (either internal or external) and the end user that defines the level of service expected from the service provider." (Project Management Institute, "A Guide to the Project Management Body of Knowledge (PMBOK® Guide)", 2017)


🧱IT: Component Object Model (Definitions)

"The programming model on which several SQL Server and database application programming interfaces (APIs), such as SQL-DMO, OLE DB, and ADO, are based." (Microsoft Corporation, "SQL Server 7.0 System Administration Training Kit", 1999)

"A group of conventions and specifications that let you create interactions between software components in a structured object-oriented way." (Craig F Smith & H Peter Alesso, "Thinking on the Web: Berners-Lee, Gödel and Turing", 2008)

"A binary standard that enables objects to interoperate in a networked environment regardless of the language in which they were developed or on which computers they reside. COM-based technologies include ActiveX Controls, Automation, and object linking and embedding (OLE). COM allows an object to expose its functionality to other components and to host applications. It defines both how the object exposes itself and how this exposure works across processes and across networks. COM also defines the object's life cycle." (Microsoft)

"A mechanism in Windows whereby an application can be registered with the operating system, thereby enabling other applications to call it. The application is given a numeric key, which is stored in the registry together with the application's location. A client calls the application by calling the key." (Microfocus)

"An object-based programming model designed to promote software interoperability; it allows two or more applications or components to easily cooperate with one another, even if they were written by different vendors, at different times, in different programming languages, or if they are running on different computers running different operating systems. OLE technology and ActiveX are both built on top of COM." (Microsoft Technet)

"An object-oriented programming model that defines how objects interact within a single process or between processes. In COM, clients have access to an object through interfaces implemented on the object." (Microsoft)

"Microsoft's architecture for creating objects with standard binary interfaces for the desktop." (Microfocus)

12 July 2019

🧱IT: Legacy System (Definitions)

"A production system that was designed for technology assumptions that are no longer valid or expected to become invalid in the foreseeable future." (Atul Apte, "Java Connector Architecture: Building Custom Connectors and Adapters", 2002)

"Systems that have been inherited from languages, platforms, and techniques earlier than current technology." (Timothy J  Kloppenborg et al, "Project Leadership", 2003)

"A system in operational use that must be sustained. Sustainment is challenging for such systems due to obsolete technology, poor structure, outdated and incomplete documentation, and lack of people with the necessary knowledge and skills." (Richard D Stutzke, "Estimating Software-Intensive Systems: Projects, Products, and Processes", 2005)

"An existing data creation, management, and reporting system in a company generally still in use." (Sharon Allen & Evan Terry, "Beginning Relational Data Modeling" 2nd Ed., 2005)

"A database or application using an out-of-date database engine or application tools. Some legacy systems can be as much as 30, or even 40 years old." (Gavin Powell, "Beginning Database Design", 2006)

"A mature system that serves ongoing needs. Legacy systems are often old, monolithic systems, built using older design approaches and older technologies." (Bruce MacIsaac & Per Kroll, "Agility and Discipline Made Easy: Practices from OpenUP and RUP", 2006)

"An information system that has been developed and modified over a period of time and has become outdated and difficult and costly to maintain but that holds important information and involves processes that are deeply ingrained in an organization. Legacy systems usually are eventually replaced by a new hardware and software configuration." (J P Getty Trust, "Introduction to Metadata" 2nd Ed., 2008)

"Old computer applications on disparate platforms, supported by outdated database systems that are still in use in many companies, as legacies from the past." (Paulraj Ponniah, "Data Warehousing Fundamentals for IT Professionals", 2010)

"Term used to describe the original financial system when implementing a new financial system." (Janice M Roehl-Anderson, "IT Best Practices for Financial Managers", 2010)

"An application implemented outside of, or from a prior version of, an organization’s application architecture. Usually an older application that may be slated for eventual replacement. Legacy systems are often frustrating because they are difficult to change, few people know exactly what they do and how they do it, and/or the technology on which they are dependent is becoming obsolete and unsupportable." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"Application that has been used for a long period of time and that has been inherited from languages, platforms, and techniques used in earlier technologies." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed., 2011)

"The older systems used to run the business of the corporation as it was defined 10 or 20 years ago" (Daniel Linstedt & W H Inmon, "Data Architecture: A Primer for the Data Scientist", 2014)

"A legacy system is a business solution that has a few common characteristics with current solutions in the market, such as being based on outdated technology or design, being incompatible or difficult and costly to integrate with current systems, and a potential inability of being purchased from vendors because it is unavailable and discontinued." (Microsoft Learning, "Migrate data and go live with Finance and Operations apps", 2020)

"An old system, technology or computer system that is not supported any more." (Analytics Insight)

🧱IT: Intranet (Definitions)

"This is a network technology similar to the Internet that has been constructed by a company for its own benefit. Usually access to a company's intranet is limited to its employees, customers, and vendors." (Dale Furtwengler, "Ten Minute Guide to Performance Appraisals", 2000)

"A private network that uses web technology to distribute information. Usually used to make information available inside a company among employees." (Andy Walker, "Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses", 2005)

"An organization’s internal system of connected networks built on Internet-standard protocols and usually connected to the Internet via a firewall." (Sharon Allen & Evan Terry, "Beginning Relational Data Modeling 2nd Ed.", 2005)

"Internal company networks designed to provide a secure forum for sharing information, often in a web-browser type interface." (Martin J Eppler, "Managing Information Quality 2nd Ed.", 2006)

"The enterprise network using Web technologies for collaboration of internal users." (Paulraj Ponniah, "Data Warehousing Fundamentals for IT Professionals", 2010)

"A subset of the Internet used internally by an organization. Unlike the larger Internet, intranets are private and accessible only from within the organization. The use of Internet technologies over a private network." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"Network designed to serve the internal informational needs of a company, using Internet tools." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed., 2011)

"a private web site available only to those within a company or organization." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed., 2012)

"A computer network designed to be used within a business or company. An intranet is so named because it uses much of the same technology as the Internet. Web browsers, email, newsgroups, HTML documents, and websites are all found on intranets.  In addition, the method for transmitting information on these networks is TCP/IP (Transmission Control Protocol/Internet Protocol). See Internet." (James R Kalyvas & Michael R Overly, "Big Data: A Businessand Legal Guide", 2015)

"A special network that only staff within the company network can access. For security reasons an intranet can only be accessed onsite and not remotely." (Faithe Wempen, "Computing Fundamentals: Introduction to Computers", 2015)

 "A trusted digital source of corporate communication and content designed to educate and empower employees and improve their workplace experiences." (Forrester)

🧱IT: IT Governance (Definitions)

"Framework for the leadership, organizational structures and business processes, standards and compliance to these standards, which ensure that the organization’s IT supports and enables the achievement of its strategies and objectives." (Alan Calder, "IT Governance: Guidelines for Directors", 2005)

"The processes, policies, relationships, and mechanisms that ensure that information technology delivers business value while balancing risk and investment decisions. IT governance ensures accountability and provides rigor for managing IT capabilities in the context of a larger corporate governance framework." (Evan Levy & Jill Dyché, "Customer Data Integration", 2006)

"Addresses the application of governance to an IT organization and its people, processes, and information to guide the way those assets support the needs of the business. It may be characterized by assigning decision rights and measures to processes." (Tilak Mitra et al, "SOA Governance", 2008)

"IT governance is the system and structure for defining policy and monitoring and controlling the policy implementation, and managing and coordinating the procedures and resources aimed at ensuring the efficient and effective execution of services." (Anton Joha & Marijn Janssen, "The Strategic Determinants of Shared Services", 2008)

"The discipline of managing IT as a service to the business, aligning IT objectives with business goals." (Allen Dreibelbis et al, "Enterprise Master Data Management", 2008)

"An integral part of enterprise governance and consists of the leadership and organizational structures and processes that ensure the enterprise’s IT sustains and extends the organization’s strategies and objectives." (Edephonce N Nfuka & Lazar Rusu, IT Governance in the Public Sector in a Developing Country, 2009)

"(1) Locus of IT decision-making authority (narrow definition). (2) The distribution of IT decision-making rights and responsibilities among different stakeholders in the organization, and the rules and procedures for making and monitoring decisions on strategic IT concerns (comprehensive definition)." (Ryan R Peterson, "Trends in Information Technology Governance", 2009)

"Structure of relationships and processes to direct and control the IT enterprise to achieve IT’s goals by adding value while balancing risk versus return over IT and its processes." (IT Governance Institute, "IT Governance Implementation Guide, Using COBIT and Val IT", 2010)

"The discipline of tracking, managing, and steering an IS/IT landscape. Architectural governance is concerned with change processes (design governance). Operational governance looks at the operational performance of systems against contracted performance levels, the definition of operational performance levels, and the implementation of systems that ensure the effective operation of systems." (David Lyle & John G Schmidt, "Lean Integration", 2010)

"Formally established statements that direct the policies regarding IT alignment with organizational goals and allocation of resources." (Linda Volonino & Efraim Turban, "Information Technology for Management 8th Ed", 2011)

"Supervision monitoring and control of an organization's IT assets." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed, 2011)

"The processes and relationships that lead to reasoned decision making in IT." (Steven Romero, "Eliminating ‘Us and Them’", 2011)

"The function of ensuring that the enterprise's IT activities match and support the organization's strategies and objectives. Governance is very often associated with budgeting, project management, and compliance activities." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed, 2012)

"Controls and process to improve the effectiveness of information technology; also, the primary way that stakeholders can ensure that investments in IT create business value and contribute toward meeting business objectives." (Robert F Smallwood, "Information Governance: Concepts, Strategies, and Best Practices", 2014)

"Processes used to ensure that IT resources are aligned with the goals of the organization. Organizations often use frameworks to help them with IT governance." (Darril Gibson, "Effective Help Desk Specialist Skills", 2014)

"The framework of rules and practices by which an organization structures its technology decision-making process in order to ensure alignment of the organization's business strategy with its operations." (David K Pham, "From Business Strategy to Information Technology Roadmap", 2016)

"Set of methods and techniques for reaching full alignment between business strategy and IT strategy." (Dalia S Vugec, "IT Strategic Grid: A Longitudinal Multiple Case Study", 2019)

"The processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals." (Lili Aunimo et al, "Big Data Governance in Agile and Data-Driven Software Development: A Market Entry Case in the Educational Game Industry", 2019)

"The structures, processes, and mechanisms by which the current and future use of ICT is directed and controlled." (Konstantinos Tsilionis & Yves Wautelet, "Aligning Strategic-Driven Governance of Business IT Services With Their Agile Development: A Conceptual Modeling-Based Approach", 2021)

"IT governance (ITG) is defined as the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals." (Gartner)

"The system by which the current and future use of IT is directed and controlled, Corporate Governance of IT involves evaluating and directing the use of IT to support the organisation and monitoring this use to achieve plans." (ISO/IEC 38500)

11 July 2019

🧱IT: Transmission Control Protocol/ Internet Protocol (Definitions)

"A protocol for connecting to the Internet or other network hosts. The primary protocol for Unix networks." (Patrick Dalton, "Microsoft SQL Server Black Book", 1997)

"An industry standard suite of protocols and applications that is used for communicating among different computers." (Owen Williams, "MCSE TestPrep: SQL Server 6.5 Design and Implementation", 1998)

"A low-level language describing the way that data flows across one or more networks (such as the Internet)." (Bill Pribyl & Steven Feuerstein, "Learning Oracle PL/SQL", 2001)

"Communication protocol of the Internet, consisting of a transport layer (IP) and an application layer (TCP)." (Ralph Kimball & Margy Ross, "The Data Warehouse Toolkit" 2nd Ed., 2002)

"An industry standard network protocol used by most companies for internetworking computer equipment." (Thomas Moore, "EXAM CRAM™ 2: Designing and Implementing Databases with SQL Server 2000 Enterprise Edition", 2005)

"The networking protocol that supports communication across interconnected networks, between computers with diverse hardware architectures and various operating systems. This is generally regarded as the industry standard for computer and Internet connections." (Sharon Allen & Evan Terry, "Beginning Relational Data Modeling 2nd Ed.", 2005)

"Networking protocols common to most forms of networks. TCP provides for synchronous communications over IP." (Tom Petrocelli, "Data Protection and Information Lifecycle Management", 2005)

"An Internet-based network protocol that is used for communicating between network nodes." (Marilyn Miller-White et al, "MCITP Administrator: Microsoft® SQL Server™ 2005 Optimization and Maintenance 70-444", 2007)

"An abbreviation for Transmission Control Protocol/Internet Protocol, this standard makes up the foundation of most computer-to-computer communication across the Internet and on local networks." (Robert D Schneider & Darril Gibson, "Microsoft SQL Server 2008 All-in-One Desk Reference For Dummies", 2008)

"The ISO standardized suite of network protocols that enables information systems to communicate with other information systems on the Internet, regardless of their computer platforms." (J P Getty Trust, "Introduction to Metadata" 2nd Ed., 2008)

"The complex stack of communications protocols that underlies the Internet. All data is broken down into small packets that are sent independently over the network and reassembled at the final destination." (Judith Hurwitz et al, "Service Oriented Architecture For Dummies" 2nd Ed., 2009)

"Internet protocols created by U.S. Department of Defense to ensure and preserve data integrity and maintain communications in the event of catastrophic war." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed., 2011)

"A protocol that provides reliable delivery of a stream of bytes from one computer to another. TCP provides reliable delivery of a stream of bytes from one computer to another." (Rod Stephens, "Start Here! Fundamentals of Microsoft .NET Programming", 2011)

"A set of standard protocols used to organize data sent across a network." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"Network standard that provides a reliable, error-checking, connection-oriented delivery method." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed., 2011)

"A protocol wrapped around the Internet Protocol to make an unreliable packet transmission mechanism appear to the application program to be a reliable stream of bytes." (Jon Orwant et al, "Programming Perl" 4th Ed., 2012)

"A suite of protocols used on the Internet and in many local area networks. Individual protocols within TCP/IP are defined in formal documents called RFCs." (Darril Gibson, "Effective Help Desk Specialist Skills", 2014)

"A suite of protocols and programs that support low-level network communication" (Nell Dale & John Lewis, "Computer Science Illuminated" 6th Ed., 2015)

"The basic protocol, or language, of modern networks and the Internet." (Weiss, "Auditing IT Infrastructures for Compliance" 2nd Ed, 2015)

"The major transport protocol in the Internet suite of protocols providing reliable, connection-oriented, full-duplex streams." (Adam Gordon, "Official (ISC)2 Guide to the CISSP CBK" 4th Ed., 2015)

"A reliable network protocol in which the transmitter and receiver engage in a handshake sequence, ensuring that there is a reliable channel and in which data received is checked against control data to ensure that it is received and received without errors." (O Sami Saydjari, "Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time", 2018)

"An industry-standard, nonproprietary set of communication protocols that provides reliable end-to-end connections between applications over interconnected networks of different types." (Sybase, "Open Server Server-Library/C Reference Manual", 2019)

"A connection-oriented, reliable protocol. One of the protocols on which the internet is based." (Daniel Leuck et al, "Learning Java" 5th Ed., 2020)

🧱IT: Cloud Computing (Definitions)

"The service delivery of any IT resource as a networked resource." (David G Hill, "Data Protection: Governance, Risk Management, and Compliance", 2009)

"A technology where the data and the application are stored remotely and made available to the user over the Internet on demand." (Janice M Roehl-Anderson, "IT Best Practices for Financial Managers", 2010)

"A business model where programs, data storage, collaboration services, and other key business tools are stored on a centralized server that users access remotely, often through a browser." (Rod Stephens, "Start Here! Fundamentals of Microsoft .NET Programming", 2011)

"Technology that is rented or leased on a regular, or as-needed basis." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed, 2011)

"Using programs and data stored on servers connected to computers via the Internet rather than storing software and data on individual computers." (Gina Abudi & Brandon Toropov, "The Complete Idiot's Guide to Best Practices for Small Business", 2011)

"The delivery of computing as a service. Cloud computing applications rely on a network (typically the Internet) to provide users with shared resources, software, and data." (Craig S Mullins, "Database Administration", 2012)

"Using Internet-based resources (e.g., applications, servers, etc.) as opposed to buying and installing in-house." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook, 3rd Ed", 2012)

"A business strategy where part or all of an organization’s information processing and storage is done by online service providers." (Kenneth A Shaw, "Integrated Management of Processes and Information", 2013)

"A computing model that makes IT resources such as servers, middleware, and applications available as services to business organizations in a self-service manner." (Marcia Kaufman et al, "Big Data For Dummies", 2013)

"Computing resources provided over the Internet using a combination of virtual machines (VMs), virtual storage, and virtual networks." (Mark Rhodes-Ousley, "Information Security: The Complete Reference, Second Edition, 2nd Ed.", 2013)

"A model for network access in which large, scalable resources are provided via the Internet as a shared service to requesting users. Access, computing, and storage services can be obtained by users without the need to understand or control the location and configuration of the system. Users consume resources as a service, and pay only for the resources that are used." (Jim Davis & Aiman Zeid, "Business Transformation: A Roadmap for Maximizing Organizational Insights", 2014)

"The delivery of software and other computer resources as a service over the Internet, rather than as a stand-alone product." (Manish Agrawal, "Information Security and IT Risk Management", 2014)

"The provision of computational resources on demand via a network. Cloud computing can be compared to the supply of electricity and gas or the provision of telephone, television, and postal services. All of these services are presented to users in a simple way that is easy to understand without users' needing to know how the services are provided. This simplified view is called an abstraction. Similarly, cloud computing offers computer application developers and users an abstract view of services, which simplifies and ignores much of the details and inner workings. A provider's offering of abstracted Internet services is often called the cloud." (Robert F Smallwood, "Information Governance: Concepts, Strategies, and Best Practices", 2014)

"A computational paradigm that aims at supporting large-scale, high-performance computing in distributed environments via innovative metaphors such as resource virtualization and de-location." (Alfredo Cuzzocrea & Mohamed M Gaber, "Data Science and Distributed Intelligence", 2015)

"A computing model that makes IT resources such as servers, middleware, and applications available as services to business organizations in a self-service manner." (Judith S Hurwitz, "Cognitive Computing and Big Data Analytics", 2015)

"A delivery model for information technology resources and services that uses the Internet to provide immediately scalable and rapidly provisioned resources as services using a subscription or utility-based fee structure." (James R Kalyvas & Michael R Overly, "Big Data: A Businessand Legal Guide", 2015)

"A service that provides storage space and other resources on the Internet" (Nell Dale & John Lewis, "Computer Science Illuminated, 6th Ed.", 2015)

"Delivering hosted services over the Internet, which includes providing infrastructures, platforms, and software as services." (Mike Harwood, "Internet Security: How to Defend Against Attackers on the Web 2nd Ed.", 2015)

"The delivery of computer processing capabilities as a service rather than as a product, whereby shared resources, software, and information are provided to end users as a utility. Offerings are usually bundled as an infrastructure, platform, or software." (Adam Gordon, "Official (ISC)2 Guide to the CISSP CBK" 4th Ed., 2015)

"A general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS), and Analytics-as-a-Service (AaaS)."  (Suren Behari, "Data Science and Big Data Analytics in Financial Services: A Case Study", 2016)

"A type of Internet-based technology in which different services (such as servers, storage, and applications) are delivered to an organization’s or an individual’s computers and devices through the Internet." (Jonathan Ferrar et al, "The Power of People: Learn How Successful Organizations Use Workforce Analytics To Improve Business Performance", 2017)

"A form of distributed computing whereby many computers and applications share the same resources to work together, often across geographically separated areas, to provide a coherent service." (O Sami Saydjari, "Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time", 2018)

"Cloud computing is a general term for the delivery of hosted services over the Internet. Cloud computing enables companies to consume compute resources as a utility - just like electricity - rather than having to build and maintain computing infrastructures in-house." (Thomas Ochs & Ute A Riemann, "IT Strategy Follows Digitalization", 2018)

"Cloud computing refers to the provision of computational resources on demand via a network. Cloud computing can be compared to the supply of a utility like electricity, water, or gas, or the provision of telephone or television services. All of these services are presented to the users in a simple way that is easy to understand without the users’ needing to know how the services are provided. This simplified view is called an abstraction. Similarly, cloud computing offers computer application developers and users an abstract view of services, which simplifies and ignores many of the details and inner workings. A provider’s offering of abstracted Internet services is often called The Cloud." (Robert F Smallwood, "Information Governance for Healthcare Professionals", 2018)

"The delivery of computing services and resources such as the servers, storage, databases, networking, software, and analytic through the internet." (Babangida Zubairu, "Security Risks of Biomedical Data Processing in Cloud Computing Environment", 2018)

"The use of shared remote computing devices for the purpose of providing improved efficiencies, performance, reliability, scalability, and security." (Shon Harris & Fernando Maymi, "CISSP All-in-One Exam Guide" 8th Ed., 2018)

"A computing model that makes information technology resources such as servers, middleware, and applications available over the internet as services to business organizations in a self-service manner." (K Hariharanath, "BIG Data: An Enabler in Developing Business Models in Cloud Computing Environments", 2019)

"Cloud computing refers to the practice of using a network of remote servers, hosted on the Internet to manage, store and process data instead of using a local server or a personal computer." (Jurij Urbančič et al, "Expansion of Technology Utilization Through Tourism 4.0 in Slovenia", 2020)

"A standardized technology delivery capability (services, software, or infrastructure) delivered via internet-standard technologies in a pay-per-use, self-service way." (Forrester)

"Cloud computing is a style of computing in which scalable and elastic IT-enabled capabilities are delivered as a service using internet technologies." (Gartner)

🧱IT: Authorization (Definitions)

"Access privileges granted to a user, program, or process or the act of granting those privileges." (CNSSI 4009-2015)

"Authorization is defined as a process ensuring that correctly authenticated users can access only those resources for which the owner has given them approval." (Gartner)

"The granting or denying of access rights to a user, program, or process." (NIST SP 800-33)

[authorization to operate:] "The official management decision given by a senior official to authorize operation of a system or the common controls inherited by designated organizations systems and to explicitly accept the risk to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security and privacy controls." (NIST SP 800-12 Rev. 1)

"The process of initially establishing access privileges of an individual and subse­quently verifying the acceptability of a request for access." (NISTIR 4734)

"The process of verifying that a requested action or service is approved for a specific entity."(NIST SP 800-152) 

"The right or a permission that is granted to a system entity to access a system resource."(NIST SP 800-82 Rev. 2)






10 July 2019

🧱IT: Crowdsourcing (Definitions)

"Obtaining information by tapping the collective knowledge of many people." (W Roy Schulte & K Chandy, "Event Processing: Designing IT Systems for Agile Companies", 2009)

"A model of problem solving and idea generation that marshals the collective talents of a large group of people." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed., 2011)

"the act of outsourcing a task to an undefined, generally large group of people or community, typically in the form of some sort of post on the Internet." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed., 2012)

"Tapping into collective online knowledge by inviting large numbers of people, via the Internet, to contribute ideas on different aspects of a business’s operations. A related concept is 'crowdfunding', which involves funding a project or venture by raising capital from individual investors via the Internet." (DK, "The Business Book", 2014)

"The process by which ideas, services, or other needs are solicited from predominantly amorphous and undefined large groups of people." (Evan Stubbs, "Big Data, Big Innovation", 2014)

"A method of resource gathering where interested potential customers pledge money to innovators for a product that has not yet been created." (Rachel Heinen et al, "Tools for the Process: Technology to Support Creativity and Innovation", 2015)

"The practice of outsourcing organisational tasks by placing a call on the internet and inviting all-comers to post submissions, often with the lure of a prize or commission for the 'best entry'." (Duncan Angwin & Stephen Cummings, "The Strategy Pathfinder" 3rd Ed., 2017)

"Dividing the work of collecting a substantial amount of data into small tasks that can be undertaken by volunteers." (Open Data Handbook)

🧱IT: Product Information Management [PIM] (Definitions)

"The management of product master data, usually via a PIM hub, to avail a single version of the truth about product data to the business." (Evan Levy & Jill Dyché, "Customer Data Integration", 2006)

"MDM Systems that focus exclusively on managing the descriptions of products are also call PIM systems." (Martin Oberhofer et al, "Enterprise Master Data Management", 2008)

"Processes and technologies focused on centrally managing information about products, with a focus on the data required to market and sell the products through one or more distribution channels. A central set of product data can be used to feed consistent, accurate, and up-to-date information to multiple output media such as websites, print catalogs, ERP systems, and electronic data feeds to trading partners. PIM systems generally need to support multiple geographic locations, multilingual data, and maintenance and modification of product information within a centralized catalog to provide consistently accurate information to multiple channels in a cost-effective manner." (Janice M Roehl-Anderson, "IT Best Practices for Financial Managers", 2010)

"Processes and tools used to predict and evaluate success of products through marketing and sales efforts." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"Product Information Management (PIM) is the process, techniques and technology of gaining control over a company's product marketing information. The objective of PIM solutions is to remove inefficiency in the marketing supply chain by delivering information to sales channels more quickly and with fewer mistakes." (Digital Asset Management)

"Product information management (PIM) is the process of managing all the information required to market and sell products through distribution channels." (Wikipedia) [source]

"Product information management (PIM) is the software-based orchestration of data dissemination related to a business’s products and its suppliers’ products. PIM coordinates changing product information across all channels of communication, thus ensuring that a business’s entire ecosystem has consistent and up-to-date information." (Informatica)

"The processes and tools for managing product information, including: 1) data centralization and governance; 2) data onboarding from partners; 3) data and content creation and enrichment; and 4) content distribution/syndication." (Forrester)

09 July 2019

🧱IT: Information Security [IS] (Definitions)

"Secures the information assets of an organization." (David G Hill, "Data Protection: Governance, Risk Management, and Compliance", 2009)

"The practice of protecting information in all its forms, whether written, spoken, electronic, graphical, or using other methods of communication." (Mark Rhodes-Ousley, "Information Security: The Complete Reference, Second Edition" 2nd Ed., 2013)

"Is the practice of protecting information from unauthorised access, use, disclosure, disruption, modification or destruction. Information security encompasses both physical and electronic information." (David Sutton, "Information Risk Management: A practitioner’s guide", 2014)

"Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability." ( Manish Agrawal, "Information Security and IT Risk Management", 2014)

"The preservation of confidentiality, integrity and availability of information [1]" (David Sutton, "Information Risk Management: A practitioner’s guide", 2014)

"The techniques and policies used to ensure proper access to data" (Nell Dale & John Lewis, "Computer Science Illuminated" 6th Ed., 2015)

"The discipline of information security goes beyond simply restricting access to confidential business information. Information security can be defined as the implementation and management of the set of tools and processes whose goal is to preserve the three key elements of information security in the business: confidentiality, integrity and availability." (Sumo Logic) [source]

🧱IT: Management Information System (Definitions)

"A system created specifically to store and provide information to managers." (Timothy J  Kloppenborg et al, "Project Leadership", 2003)

"A computer-based or manual system that transforms data into information useful in the support of decision making." (Jae K Shim & Joel G Siegel, "Budgeting Basics and Beyond", 2008)

"A reporting or Business Intelligence system." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"The full range of information technology solutions required by a business to run its daily operations, support strategic planning and process improvement activities, and identify issues requiring management attention for their resolution. See Decision Support System for an example of one of the components of MIS." (Kenneth A Shaw, "Integrated Management of Processes and Information", 2013)

"The software applications and computer hardware systems in an enterprise that provide information for management decisions regarding its business operations. Also see Decision Support System." (Kenneth A Shaw, "Integrated Management of Processes and Information", 2013)

"Systems designed to provide past, present, and future routine information appropriate for planning, organizing, and controlling the operations of functional areas in an organization." (Linda Volonino & Efraim Turban, "Information Technology for Management 8th Ed", 2011)

🧱IT: Information System (Definitions)

"Computerized or manual structure of procedures and records. (9-11)" (Leslie G Eldenburg & Susan K Wolcott, "Cost Management" 2nd Ed., 2011)

"An interconnected environment for managing and processing data using a computer." (Faithe Wempen, "Computing Fundamentals: Introduction to Computers", 2015)

"Software that helps the user organize and analyze data" (Nell Dale & John Lewis, "Computer Science Illuminated" 6th Ed., 2015)

"1.Generally, an automated or manual organized process for collecting, manipulating, transmitting, and disseminating information. SEE ALSO application. 2.In data management, a system that supports decision-making concerning some piece of reality (the object system) by giving decision-makers access to information concerning relevant aspects of the object system and its environment." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"A physical process that supports an organization by collecting, processing, storing, and analyzing data, and disseminating information to achieve organizational goals." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed., 2011)

"A system that provides for data collection, storage, and retrieval; facilitates the transformation of data into information and the management of both data and information. An information system is composed of hardware, software (DMBS and applications), the database(s), people, and procedures." (Carlos Coronel et al, "Database Systems: Design, Implementation, and Management 9th Ed", 2011)

"The varied manual and automated communication mechanisms within an organization that store, process, disseminate, and sometimes even analyze information for those who need it." (Joan C Dessinger, "Fundamentals of Performance Improvement 3rd Ed", 2012)

"System that supports enterprise activities." (Gilbert Raymond & Philippe Desfray, "Modeling Enterprise Architecture with TOGAF", 2014)

Related Posts Plugin for WordPress, Blogger...

About Me

My photo
Koeln, NRW, Germany
IT Professional with more than 24 years experience in IT in the area of full life-cycle of Web/Desktop/Database Applications Development, Software Engineering, Consultancy, Data Management, Data Quality, Data Migrations, Reporting, ERP implementations & support, Team/Project/IT Management, etc.