24 July 2019

💻IT: Information Technology Information Library [ITIL] (Definitions)

"A series of documents used to aid the implementation of a framework for IT service management (ITSM). This framework defines how service management is applied in specific organizations. Being a framework, it is completely customizable for an application within any type of business or organization that has a reliance on IT infrastructure." (Tilak Mitra et al, "SOA Governance", 2008)

"A framework and set of standards for IT governance based on best practices." (Judith Hurwitz et al, "Service Oriented Architecture For Dummies" 2nd Ed., 2009)

"A framework of supplier independent best practice management procedures for delivery of high quality IT services." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"a set of guidelines for developing and managing IT operations and services." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed., 2012)

"A framework and set of standards for IT governance based on best practices." (Marcia Kaufman et al, "Big Data For Dummies", 2013)

"A group of books written and released by the United Kingdom’s Office of Government and Commerce (OGC). ITIL documents best practices organizations can implement to provide consistent IT services. The library includes five books." (Darril Gibson, "Effective Help Desk Specialist Skills", 2014)

"A set of process-oriented best practices and guidance originally developed in the United Kingdom to standardize delivery of informational technology service management." (Robert F Smallwood, "Information Governance: Concepts, Strategies, and Best Practices", 2014)

"Best practices for information technology services management processes developed by the United Kingdom’s Office of Government Commerce." (Adam Gordon, "Official (ISC)2 Guide to the CISSP CBK" 4th Ed., 2015)

"The IT Infrastructure Library; a set of best practice publications for IT service management." (by Brian Johnson & Leon-Paul de Rouw, "Collaborative Business Design", 2017)

"The Information Technology Infrastructure Library (ITIL) presents pre-defined processes for IT service management. The fourth edition of ITIL depicts two key elements ITIL Service-Value-System (SVS) and a four dimensions model." (Anna Wiedemann et al, "Transforming Disciplined IT Functions: Guidelines for DevOps Integration", 2021)

"set of best practices guidance" (ITIL)

17 July 2019

💻IT: Configuration Management [CM] (Definitions)

 "A discipline applying technical and administrative direction and surveillance to: identify and document the functional and physical characteristics of a configuration item, control changes to those characteristics, record and report change processing and implementation status, and verify compliance with specified requirements. (IEEE 610, 1990)

"The process of identifying and defining the configuration items in a system, controlling the release and change of these items throughout the system life cycle, recording and reporting the status of configuration items and change requests, and verifying the completeness and correctness of configuration items." (Richard D Stutzke, "Estimating Software-Intensive Systems: Projects, Products, and Processes", 2005)

"Process for the definition and management of configurations, allowing change control and change monitoring over a defined period. Configuration management allows access to individual configurations or configuration items (i.e., work products). Differences between individual configurations are readily identifiable. A configuration can be used to form a baseline; see also Baseline." (Lars Dittmann et al, "Automotive SPICE in Practice", 2008)

"A generic term that is often used to describe the whole of the activities concerned with the creation, maintenance, and control of databases and their environments." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"The management of configurations, normally involving holding configuration data in a database so that the data can be managed and changed where necessary." (Marcia Kaufman et al, "Big Data For Dummies", 2013)

"Managing the items produced by the project such as requirements documents, designs, and, of course, source code. This may include controlling changes to those items so that changes don’t happen willy-nilly." (Rod Stephens, "Beginning Software Engineering", 2015)

"The detailed recording, management, and updating of the details of an information system." (Weiss, "Auditing IT Infrastructures for Compliance, 2nd Ed", 2015)

"An operational process aimed at ensuring that systems and controls are configured correctly and are responsive to the current threat and operational environments." (Shon Harris & Fernando Maymi, "CISSP All-in-One Exam Guide" 8th Ed, 2018)

"The process of controlling modifications to a system’s hardware, software, and documentation, which provides sufficient assurance that the system is protected against the introduction of improper modification before, doing, and after system implementation." (William Stallings, "Effective Cybersecurity: A Guide to Using Best Practices and Standards", 2018)

"The process of managing versions of configuration items and their coherent consistent sets, in order to control their modification and release, and to ensure their consistency, completeness, and accuracy." (Bruce P Douglass, "Real-Time Agility: The Harmony/ESW Method for Real-Time and Embedded Systems Development", 2009)

"Process responsible for maintaining information about CIs required to deliver an IT service, including their relationships" (ITIL)

16 July 2019

💻IT: Quality of Service [QoS] (Definitions)

"The guaranteed performance of a network connection." (Tom Petrocelli, "Data Protection and Information Lifecycle Management", 2005)

"QoS (Quality of Service) is a metric for quantifying desired or delivered degree of service reliability, priority, and other measures of interest for its quality." (Bo Leuf, "The Semantic Web: Crafting infrastructure for agency", 2006)

"a criterion of performance of a service or element, such as the worst-case execution time for an operation." (Bruce P Douglass, "Real-Time Agility: The Harmony/ESW Method for Real-Time and Embedded Systems Development", 2009)

"The QoS describes the non-functional aspects of a service such as performance." (Martin Oberhofer et al, "The Art of Enterprise Information Architecture", 2010)

"QoS (Quality of Service) Networking technology that enables network administrators to manage bandwidth and give priority to desired types of application traffic as it traverses the network." (Mark Rhodes-Ousley, "Information Security: The Complete Reference" 2nd Ed., 2013)

"A negotiated contract between a user and a network provider that renders some degree of reliable capacity in the shared network." (Gartner)

"Quality of service (QoS) is the description or measurement of the overall performance of a service, especially in terms of the user’s experience. Typically it is used in reference to telephony or computer networks, or to online and cloud-hosted services." (Barracuda) [source]

"The measurable end-to-end performance properties of a network service, which can be guaranteed in advance by a Service Level Agreement between a user and a service provider, so as to satisfy specific customer application requirements. Note: These properties may include throughput (bandwidth), transit delay (latency), error rates, priority, security, packet loss, packet jitter, etc." (CNSSI 4009-2015)

15 July 2019

💻IT: Platform (Definitions)

"A specific software implementation technology and/or specific hardware that constitutes the execution environment of a system." (Anneke Kleppe et al, "MDA Explained: The Model Driven Architecture™: Practice and Promise", 2003)

"In the automotive industry, a platform describes a technical basis on which to build models that appear outwardly different. In electronic development, a platform is understood as a hardware, software, or system construction kit that allows the easy creation of derivates via modification, parameterization, or derivation. All essential features, however, are preserved." (Lars Dittmann et al, "Automotive SPICE in Practice", 2008)

"The underlying foundations, technology frameworks, base architectures, and interfaces upon which products are built." (Steven Haines, "The Product Manager's Desk Reference", 2008)

"A combination of technology infrastructure products and components on which various application programs can be designed to run." (David Lyle & John G Schmidt, "Lean Integration", 2010)

"A type of computer hardware that is compatible with certain operating systems." (Faithe Wempen, "Computing Fundamentals: Introduction to Computers", 2015)

"A product, technology, or system that provides a foundation for a number of complementary products (or applications). In business, platforms that form an interface between two‐sided markets (comprising application suppliers and final users) occupy an especially important role in several technology‐based sectors." (Robert M Grant, "Contemporary Strategy Analysis" 10th Ed., 2018)

💻IT: Authentication (Definitions)

"The process by which an entity proves to another entity that it is acting on behalf of a specific identity. The J2EE platform requires three types of authentication: basic, form-based, and mutual, and supports digest authentication." (Kim Haase et al, "The J2EE™ Tutorial", 2002)

"The process by which the identity of a user or process is verified." (Tom Petrocelli, "Data Protection and Information Lifecycle Management", 2005)

"A human or machine process that verifies that an individual, computer, or information object is who or what it purports to be." (J P Getty Trust, "Introduction to Metadata" 2nd Ed., 2008)

"A method of proving someone’s identity, especially if that someone is an authorized user of processes or resources." (Tomasz Ciszkowski & Zbigniew Kotulski, "Secure Routing with Reputation in MANET", 2008)

"Provides capabilities to authenticate users. These services may support multiple authentication mechanisms, such as user name/password, hardware token-based, biometric-based, and others." (Allen Dreibelbis et al, "Enterprise Master Data Management", 2008)

"(1) A legal evidentiary standard that, in the case of electronically stored information, ensures that the data and its associated metadata is accurate, complete, and has not been altered. Without authentication, data cannot be used as evidence. (2) A security function that defines the rules and responsibilities of individuals, applications, and devices for creating, reading, updating, and deleting data." (David G Hill, "Data Protection: Governance, Risk Management, and Compliance", 2009)

"The process by which the identity of a person or computer process is verified." (Judith Hurwitz et al, "Service Oriented Architecture For Dummies" 2nd Ed., 2009)

"A process designed to verify that an individual or a party are who they claim they are." (Alex Berson & Lawrence Dubov, "Master Data Management and Data Governance", 2010)

"The process of verifying the legitimate users of a resource. Often used synonymously with Identification and Authentication." (Mark S Merkow & Lakshmikanth Raghavan, "Secure and Resilient Software Development", 2010)

"(1) In data security, the process of verifying whether a person or software agent requesting a resource has the authority or permission to access that resource. (2) In data quality, the process of verifying data as complying with what the data represents." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"The process by which the identity of a person or computer process is verified." (Marcia Kaufman et al, "Big Data For Dummies", 2013)

"Verification of who a person or information resource claims to be that sufficiently convinces the authenticator that the identity claim is true. This is followed by an evaluation of whether that entity should be granted access to resources." (Mark Rhodes-Ousley, "Information Security: The Complete Reference" 2nd Ed., 2013)

"the process that a user goes through to prove that he or she is the owner of the identity that is being used." (Manish Agrawal, "Information Security and IT Risk Management", 2014)

"The process of establishing the validity of a person’s identity." (Mike Harwood, "Internet Security: How to Defend Against Attackers on the Web" 2nd Ed., 2015)

"The process of providing additional credentials that match the user ID or user name." (Weiss, "Auditing IT Infrastructures for Compliance" 2nd Ed., 2015)

"The process of verifying the credentials of a particular user of a computer or software system" (Nell Dale & John Lewis, "Computer Science Illuminated" 6th Ed., 2015)

"Verification of the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system." (James R Kalyvas & Michael R Overly, "Big Data: A Businessand Legal Guide", 2015)

"A process by which an entity proves its identity to another party (e.g., authentication required by a user to log in or log on)." (O Sami Saydjari, "Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time", 2018)

"Verification of the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system." (William Stallings, "Effective Cybersecurity: A Guide to Using Best Practices and Standards", 2018)

"Authentication is about validating the access request. When a user or a process tries to log into an application, system, or a database, it is important to verify its identity. One way to verify identity is through a username and password; a security token is another option. When the authentication takes place, all data exchange is typically encrypted to prevent theft during the authentication process." (Piethein Strengholt, "Data Management at Scale", 2020)

"A process that provides assurance of the source and integrity of information in communications sessions, messages, documents or stored data." (NIST SP 800-57 Part 1 Rev. 4)

"A process that provides assurance of the source and integrity of information in communications sessions, messages, documents or stored data or that provides assurance of the identity of an entity interacting with a system." (NIST SP 800-57 Part 2 Rev.1)

"A process that establishes the origin of information, or determines an entity’s identity. In a general information security context: Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system." (NIST SP 800-57 Part 2)

"A process that establishes the source of information, provides assurance of an entity’s identity or provides assurance of the integrity of communications sessions, messages, documents or stored data." (NIST SP 800-57 Part 1 Rev. 3)

"An authentication service is a mechanism, analogous to the use of passwords on time-sharing systems, for the secure authentication of the identity of network clients by servers and vice versa, without presuming the operating system integrity of either (e.g., Kerberos)." (Gartner)

"A security measure designed to protect a communications system against acceptance of fraudulent transmission or simulation by establishing the validity of a transmission, message, originator, or a means of verifying an individual's eligibility to receive specific categories of information." (CNSSI 4009-2015)

"Authentication is the process of verifying the claimed identity of a session requestor." (NIST SP 800-13)

"Provides assurance of the authenticity and, therefore, the integrity of data." (NIST SP 800-67 Rev. 2)

"Security measures designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information." (NIST SP 800-59)

"The corroboration that a person is the one claimed." (NIST SP 800-66 Rev. 1)

"The process of establishing confidence in the claimed identity of a user or system." (NISTIR 7682)

"The process of proving the claimed identity of an individual user, machine, software component or any other entity.  Typical authentication mechanisms include conventional password schemes, biometrics devices, cryptographic methods, and onetime passwords (usually implemented with token based cards.)" (NISTIR 5153)

"The process of verifying the authorization of a user, process, or device, usually as a prerequisite for granting access to resources in an IT system." (NIST SP 800-47)

"The process of verifying the integrity of data that has been stored, transmitted, or otherwise exposed to possible unauthorized access." (NISTIR 4734)

"Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system." (FIPS 200)

"Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in a system." (NIST SP 800-12 Rev. 1)

"Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to a system’s resources." (NIST SP 1800-17c)

💻IT: Virtual Machine [VM] (Definitions)

"An imaginary computer that runs compiled Java programs. Your computer or Web browser must emulate a virtual machine to run a Java applet or application." (Greg Perry, "Sams Teach Yourself Beginning Programming in 24 Hours" 2nd Ed., 2001)

"The combination of hardware and software (OS, DBMS, etc.) that provides the underlying environment that supports the operation of a software product." (Richard D Stutzke, "Estimating Software-Intensive Systems: Projects, Products, and Processes", 2005)

"Everything under the control of a guest operating system that is managed by a Hypervisor." (David G Hill, "Data Protection: Governance, Risk Management, and Compliance", 2009)

"System that offers the expected functionality associated with a device, but is actually implemented on top of a lower level system. The typical example is the Java Virtual Machine, which specifies a mode of operation for a virtual processor that is subsequently emulated on a different processor architecture." (Max Domeika, "Software Development for Embedded Multi-core Systems", 2011)

"software that allows you to take a single physical device (e.g., one PC) and run multiple instances of operating systems on it." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed., 2012)

"A computer operating system and associated storage and input/output resources that are completely provided by software. This is done by a hypervisor that allocates hardware resources by translating between the actual hardware and the software that attempts to access it. See also hypervisor." (Mark Rhodes-Ousley, "Information Security: The Complete Reference" 2nd Ed., 2013)

"Software programs that look and run like a physical computer." (Weiss, "Auditing IT Infrastructures for Compliance" 2nd Ed, 2015)

"The illusion created by a timesharing system that each user has a dedicated machine" (Nell Dale & John Lewis, "Computer Science Illuminated" 6th Ed., 2015)

"This term is ambiguous. (a) It sometimes refers to the combination of the system hardware resources and the low-level operating system (called a hypervisor) that is responsible for creating the illusion to operating systems running on it that they have exclusive use of the system. (b) A virtual machine can also refer to a guest operating system running on top of a hypervisor." (O Sami Saydjari, "Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time", 2018)

"A virtual machine is a software representation of a computer." (Alex Thomas, "Natural Language Processing with Spark NLP", 2020)

"An IBM mainframe operating system that can host other IBM operating systems such as MVS or VSE, so that an application running under an operating system seems to have its own complete system of software and hardware resources." (Microfocus

"The software implementation of a physical computer that runs an operating system. Multiple virtual machines can run simultaneously on the same hardware. In Azure, virtual machines are available in a variety of sizes." (Microsoft, "Azure Glossary")

💻IT: Search Engine Optimization [SEO] (Definitions)

"The set of techniques and methodologies devoted to improving organic search rankings (not paid search) for a Web site." (Mike Moran & Bill Hunt , "Search Engine Marketing, Inc", 2005)

"The process and strategy of presenting a business on the web to improve the ability of potential customers finding it through natural searches on search engines such as Google, Yahoo!, and Bing." (Gina Abudi & Brandon Toropov, "The Complete Idiot's Guide to Best Practices for Small Business", 2011)

"The process of improving the volume or quality of traffic to a Web site from search engines via unpaid search results." (Linda Volonino & Efraim Turban, "Information Technology for Management 8th Ed", 2011)

"techniques to help ensure that a web site appears as close to the first position on a web search results page as possible." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed., 2012)

"Search engine optimization, the set of techniques and methodologies devoted to improving organic search rankings (not paid search) for a Web site." (Mike Moran & Bill Hunt , "Search Engine Marketing, Inc", 2005)

"The process of writing web content so as to increase a page's ranking in online search results." (Faithe Wempen, "Computing Fundamentals: Introduction to Computers", 2015)

"its main function is to increase website visibility. The main search engines use algorithms to rank a website’s position and hence its overall position in the search results. In some instances it can be as simple as structuring the words on a website in a way the search engine operates. " (BCS Learning & Development Limited, "CEdMA Europe", 2019)

14 July 2019

💻IT: Asset (Definitions)

[process asset:] "Anything that the organization considers useful in attaining the goals of a process area." (Sandy Shrum et al, "CMMI: Guidelines for Process Integration and Product Improvement", 2003)

[organizational process assets:] "Artifacts that relate to describing, implementing, and improving processes (e.g., policies, measurements, process descriptions, and process implementation support tools). The term process assets is used to indicate that these artifacts are developed or acquired to meet the business objectives of the organization, and they represent investments by the organization that are expected to provide current and future business value." (Sandy Shrum et al, "CMMI: Guidelines for Process Integration and Product Improvement", 2003)

[process asset:] "Artifacts that relate to describing, implementing, and improving processes (e.g., policies, process descriptions, guidance, examples, aids, checklists, project closeout reports, metrics data, and training materials). The artifacts meet the organization’s business objectives, and represent investments expected to provide current and future business value." (Richard D Stutzke, "Estimating Software-Intensive Systems: Projects, Products, and Processes", 2005)

[organizational process assets:] "Any or all process-related assets, from any or all of the organizations involved in the project that are or can be used to influence the project's success. These process assets include formal and informal plans, policies, procedures, and guidelines. The process assets also include the organizations’ knowledge bases such as lessons learned and historical information." (Project Management Institute, "Practice Standard for Project Estimating", 2010)

[organizational process assets:] "Any or all process related assets, from any or all of the organizations involved in the project that are or can be used to influence the project's success. These process assets include formal and informal plans, policies, procedures, and guidelines. The process assets also include the organizations' knowledge bases such as lessons learned and historical information." (Cynthia Stackpole, "PMP Certification All-in-One For Dummies", 2011)

[IT assets:] "Tangible deliverables created during the course of an IT project that can be used in other similar projects. Examples include design, software code, or a testing scenario." (Janice M Roehl-Anderson, "IT Best Practices for Financial Managers", 2010)

[organizational process assets:] "Plans, processes, policies, procedures, and knowledge bases specific to and used by the performing organization. " (Project Management Institute, "The Standard for Portfolio Management" 3rd Ed., 2012)

[organizational process assets:] "Plans, processes, policies, procedures, and knowledge bases that are specific to and used by the performing organization." (For Dummies, "PMP Certification All-in-One For Dummie", 2nd Ed., 2013)

[Software assets:] "software tools needed to manipulate the organization's information to accomplish the organization's mission." ( Manish Agrawal, "Information Security and IT Risk Management", 2014)

"Data contained in an information system; or a service provided by a system; or a system capability, such as processing power or communication bandwidth; or an item of system equipment (that is, a system component - hardware, firmware, software, or documentation); or a facility that houses system operations and equipment." (William Stallings, "Effective Cybersecurity: A Guide to Using Best Practices and Standards", 2018)

"Any item that has value to the organisation." (ISO/IEC 27000:2012)

💻IT: Web 2.0 (Definitions)

"A phrase used loosely by the Web development community to refer to a perceived “second generation” of Web technologies and applications. Wikis, folksonomies, gaming, podcasting, blogging, and so on, are all considered Web 2.0 applications." (J P Getty Trust, "Introduction to Metadata" 2nd Ed., 2008)

"A trend in the use of World Wide Web technology and web design that aims to facilitate creativity, information sharing, and, most notably, collaboration among users." (Tilak Mitra et al, "SOA Governance", 2008)

"describes a second generation of the World Wide Web that is focused on the ability for people to collaborate and share information online. Web 2.0 basically refers to the transition from static HTML web pages to a more dynamic Web that is more organized and is based on serving web applications to users." (Gina C O'Connor & V K Narayanan, "Encyclopedia of Technology and Innovation Management", 2010)

"The name attributed to two-way Internet capability for users to both upload and download content." (Ruth C Clark & Richard E Mayer, "e-Learning and the Science of Instruction", 2011)

"The second generation of Internet-based services that let people collaborate and create information online in perceived new ways - such as social networking sites, wikis, and blogs." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed, 2011)

"a second generation of Internet-based tools and applications that facilitate communication, collaboration, connectivity, sharing, etc." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed. , 2012)

"Web advancements between 2003 and 2010, where social networking activities and tools greatly improved. Also referred to as the Social Web." (Mike Harwood, "Internet Security: How to Defend Against Attackers on the Web" 2nd Ed., 2015)

"The name attributed to two-way Internet capability for users to both upload and download content." (Ruth C Clark & Richard E Mayer, "e-Learning and the Science of Instruction", 2016)

"The evolution of the Web from a collection of hyperlinked content pages to a platform for human collaboration and system development and delivery." (Gartner)

"was a phrase first coined in 2004 to describe the second stage of the World Wide Web’s development. These developments include the evolution from static web pages to dynamic, interactive and user-generated content and the growth of social media. Examples of web 2.0 range from online banking to remote email access." (Accenture)

13 July 2019

💻IT: Service Level Agreement [SLA] (Definitions)

"A signed agreement of system service requirements between two parties (such as your company and an ASP or between your department and end users) that defines the guidelines, response times, actions, and so on, that will be adhered to for the life of the agreement." (Allan Hirt et al, "Microsoft SQL Server 2000 High Availability", 2004)

"A contract with a service provider, be it an internal IT organization, application service provider, or outsourcer, that specifies discrete reliability and availability requirements for an outsourced system. An SLA might also include other requirements such as support of certain technology standards or data volumes. An outsourcer’s failure to adhere to the terms laid out in an SLA could result in financial penalties." (Evan Levy & Jill Dyché, "Customer Data Integration", 2006)

"A formal negotiated agreement between two parties. It is a contract that exists between customers and their service provider, or between service providers. It records the common understanding about services, priorities, responsibilities, guarantees, and so on, with the main purpose to agree on the level of service." (Tilak Mitra et al, "SOA Governance", 2008)

"An agreement between a customer and a product or service provider that defines conditions under which the provider will offer support or additional services to the customer, and what level of services will be offered under each of those conditions." (Steven Haines, "The Product Manager's Desk Reference", 2008)

"An agreement between a service provider and a service recipient that formally defines the levels of service that are to be provided." (David G Hill, "Data Protection: Governance, Risk Management, and Compliance", 2009)

"A formal negotiated agreement between two parties that usually records the common understanding about priorities, responsibilities, and warranties, with the main purpose of agreeing on the quality of the service. For example, an SLA may specify the levels of availability, serviceability, performance, operation, or other attributes of the service (such as billing and even penalties in the case of violations of the SLA)." (David Lyle & John G Schmidt, "Lean Integration", 2010)

"A written legal contract between a service provider and client wherein the service provider guarantees a minimum level of service." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed., 2011)

"A contracted guarantee of service delivery for a program, transaction, service, or workload." (Craig S Mullins, "Database Administration", 2012)

"The part of a contract between two parties that outlines the delivery of services within defined timeframes." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"A statement to customers or the user community about the service the IT department will provide. It can refer to a variety of metrics, such as performance, up-time, resolution time, and so on." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed., 2012)

"An agreement between an IT service provider and a customer to provide a specific level of reliability for a service. It stipulates performance expectations such as minimum uptime and maximum downtime levels. Many SLAs include monetary penalties if the IT service provider does not provide the service as promised." (Darril Gibson, "Effective Help Desk Specialist Skills", 2014)

"The service or maintenance contract that states the explicit levels of support, response time windows or ranges, escalation procedures in the event of a persistent problem, and possible penalties for nonconformance in the event the vendor does not meet its contractual obligations." (Robert F Smallwood, "Information Governance: Concepts, Strategies, and Best Practices", 2014)

"A contract for formally defined services. Particular aspects of the service (scope, quality, responsibilities) are agreed between the service provider and the service user. A common feature of an SLA is a contracted delivery time of the service or performance." (Thomas C Wilson, "Value and Capital Management", 2015)

"A portion of a service contract that promises specific levels of service." (Weiss, "Auditing IT Infrastructures for Compliance" 2nd Ed, 2015)

"A contract between a service provider (either internal or external) and the end user that defines the level of service expected from the service provider." (Project Management Institute, "A Guide to the Project Management Body of Knowledge (PMBOK® Guide)", 2017)


💻IT: Extranet (Definitions)

"A secure Internet site available only to a company’s internal staff and approved third-party partners. Extranets are flourishing in B2B environments where suppliers can have ready access to updated information from their business customers, and vice versa." (Evan Levy & Jill Dyché, "Customer Data Integration", 2006)

"Semi-public TCP/IP network used by several collaborating partners." (Martin J Eppler, "Managing Information Quality 2nd Ed.", 2006)

"Enterprise network using Web technologies for collaboration of internal users and selected external business partners." (Paulraj Ponniah, "Data Warehousing Fundamentals for IT Professionals", 2010)

"An internal network or intranet opened to selected business partners. Suppliers, distributors, and other authorized users can connect to a company’s network over the Internet or through private networks." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"Private, company-owned network that uses IP technology to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses." (Linda Volonino & Efraim Turban, "Information Technology for Management 8th Ed", 2011)

"A network that is outside the control of the company. Extranets are usually connections to outside companies, service providers, customers, and business partners." (Mark Rhodes-Ousley, "Information Security: The Complete Reference" 2nd Ed., 2013)

"A special network set up by a business for its customers, staff, and business partners to access from outside the office network; may be used to share marketing assets and other non-sensitive items." (Faithe Wempen, "Computing Fundamentals: Introduction to Computers", 2015)

"An extension of the corporate intranet over the Internet so that vendors, business partners, customers, and others can have access to the intranet." (James R Kalyvas & Michael R Overly, "Big Data: A Businessand Legal Guide", 2015)

12 July 2019

💻IT: Intranet (Definitions)

"This is a network technology similar to the Internet that has been constructed by a company for its own benefit. Usually access to a company's intranet is limited to its employees, customers, and vendors." (Dale Furtwengler, "Ten Minute Guide to Performance Appraisals", 2000)

"A private network that uses web technology to distribute information. Usually used to make information available inside a company among employees." (Andy Walker, "Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses", 2005)

"An organization’s internal system of connected networks built on Internet-standard protocols and usually connected to the Internet via a firewall." (Sharon Allen & Evan Terry, "Beginning Relational Data Modeling 2nd Ed.", 2005)

"Internal company networks designed to provide a secure forum for sharing information, often in a web-browser type interface." (Martin J Eppler, "Managing Information Quality 2nd Ed.", 2006)

"The enterprise network using Web technologies for collaboration of internal users." (Paulraj Ponniah, "Data Warehousing Fundamentals for IT Professionals", 2010)

"A subset of the Internet used internally by an organization. Unlike the larger Internet, intranets are private and accessible only from within the organization. The use of Internet technologies over a private network." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"Network designed to serve the internal informational needs of a company, using Internet tools." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed., 2011)

"a private web site available only to those within a company or organization." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed., 2012)

"A computer network designed to be used within a business or company. An intranet is so named because it uses much of the same technology as the Internet. Web browsers, email, newsgroups, HTML documents, and websites are all found on intranets.  In addition, the method for transmitting information on these networks is TCP/IP (Transmission Control Protocol/Internet Protocol). See Internet." (James R Kalyvas & Michael R Overly, "Big Data: A Businessand Legal Guide", 2015)

"A special network that only staff within the company network can access. For security reasons an intranet can only be accessed onsite and not remotely." (Faithe Wempen, "Computing Fundamentals: Introduction to Computers", 2015)

 "A trusted digital source of corporate communication and content designed to educate and empower employees and improve their workplace experiences." (Forrester)

💻IT: IT Governance (Definitions)

"Framework for the leadership, organizational structures and business processes, standards and compliance to these standards, which ensure that the organization’s IT supports and enables the achievement of its strategies and objectives." (Alan Calder, "IT Governance: Guidelines for Directors", 2005)

"The processes, policies, relationships, and mechanisms that ensure that information technology delivers business value while balancing risk and investment decisions. IT governance ensures accountability and provides rigor for managing IT capabilities in the context of a larger corporate governance framework." (Evan Levy & Jill Dyché, "Customer Data Integration", 2006)

"Addresses the application of governance to an IT organization and its people, processes, and information to guide the way those assets support the needs of the business. It may be characterized by assigning decision rights and measures to processes." (Tilak Mitra et al, "SOA Governance", 2008)

"IT governance is the system and structure for defining policy and monitoring and controlling the policy implementation, and managing and coordinating the procedures and resources aimed at ensuring the efficient and effective execution of services." (Anton Joha & Marijn Janssen, "The Strategic Determinants of Shared Services", 2008)

"The discipline of managing IT as a service to the business, aligning IT objectives with business goals." (Allen Dreibelbis et al, "Enterprise Master Data Management", 2008)

"An integral part of enterprise governance and consists of the leadership and organizational structures and processes that ensure the enterprise’s IT sustains and extends the organization’s strategies and objectives." (Edephonce N Nfuka & Lazar Rusu, IT Governance in the Public Sector in a Developing Country, 2009)

"(1) Locus of IT decision-making authority (narrow definition). (2) The distribution of IT decision-making rights and responsibilities among different stakeholders in the organization, and the rules and procedures for making and monitoring decisions on strategic IT concerns (comprehensive definition)." (Ryan R Peterson, "Trends in Information Technology Governance", 2009)

"Structure of relationships and processes to direct and control the IT enterprise to achieve IT’s goals by adding value while balancing risk versus return over IT and its processes." (IT Governance Institute, "IT Governance Implementation Guide, Using COBIT and Val IT", 2010)

"The discipline of tracking, managing, and steering an IS/IT landscape. Architectural governance is concerned with change processes (design governance). Operational governance looks at the operational performance of systems against contracted performance levels, the definition of operational performance levels, and the implementation of systems that ensure the effective operation of systems." (David Lyle & John G Schmidt, "Lean Integration", 2010)

"Formally established statements that direct the policies regarding IT alignment with organizational goals and allocation of resources." (Linda Volonino & Efraim Turban, "Information Technology for Management 8th Ed", 2011)

"Supervision monitoring and control of an organization's IT assets." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed, 2011)

"The processes and relationships that lead to reasoned decision making in IT." (Steven Romero, "Eliminating ‘Us and Them’", 2011)

"The function of ensuring that the enterprise's IT activities match and support the organization's strategies and objectives. Governance is very often associated with budgeting, project management, and compliance activities." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook" 3rd Ed, 2012)

"Controls and process to improve the effectiveness of information technology; also, the primary way that stakeholders can ensure that investments in IT create business value and contribute toward meeting business objectives." (Robert F Smallwood, "Information Governance: Concepts, Strategies, and Best Practices", 2014)

"Processes used to ensure that IT resources are aligned with the goals of the organization. Organizations often use frameworks to help them with IT governance." (Darril Gibson, "Effective Help Desk Specialist Skills", 2014)

"The framework of rules and practices by which an organization structures its technology decision-making process in order to ensure alignment of the organization's business strategy with its operations." (David K Pham, "From Business Strategy to Information Technology Roadmap", 2016)

"Set of methods and techniques for reaching full alignment between business strategy and IT strategy." (Dalia S Vugec, "IT Strategic Grid: A Longitudinal Multiple Case Study", 2019)

"The processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals." (Lili Aunimo et al, "Big Data Governance in Agile and Data-Driven Software Development: A Market Entry Case in the Educational Game Industry", 2019)

"The structures, processes, and mechanisms by which the current and future use of ICT is directed and controlled." (Konstantinos Tsilionis & Yves Wautelet, "Aligning Strategic-Driven Governance of Business IT Services With Their Agile Development: A Conceptual Modeling-Based Approach", 2021)

"IT governance (ITG) is defined as the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals." (Gartner)

"The system by which the current and future use of IT is directed and controlled, Corporate Governance of IT involves evaluating and directing the use of IT to support the organisation and monitoring this use to achieve plans." (ISO/IEC 38500)

💻IT: Localization (Definitions)

"The process of making a program suitable for execution within a particular geographic region, typically by translating messages to the local language and handling things such as local time zones, currency symbols, date formats, and so on. Sometimes localization is used just to refer to the language translation and the term internationalization to the rest of the process." (Stephen G Kochan, "Programming in Objective-C", 2003)

"The process of customizing a globalized application for a specific culture." (Rod Stephens, "Stephens' Visual Basic® Programming 24-Hour Trainer", 2011)

"The process of making a program support a specific locale." (Rod Stephens, "Start Here! Fundamentals of Microsoft® .NET Programming", 2011)

"The process of adapting a product and/or content (including text and non-text elements) to meet the language, cultural, and political expectations and/or requirements of a specific local market (locale)." (SQL Server 2012 Glossary, "Microsoft", 2012)

"The process of customizing and adapting a global application for a particular culture and locale." (Joan C Dessinger, "Fundamentals of Performance Improvement" 3rd Ed., 2012)

"The process of setting up an application to run in a particular national language environment. An application that is localized typically generates messages in a local language and character set and uses local datetime formats." (Sybase, "Open Server Server-Library/C Reference Manual", 2019)

 "A view that joins horizontally partitioned data from a set of member tables across a single server, making the data appear as if from one table." (Microsoft Technet)

11 July 2019

💻IT: Cloud Computing (Definitions)

"The service delivery of any IT resource as a networked resource." (David G Hill, "Data Protection: Governance, Risk Management, and Compliance", 2009)

"A technology where the data and the application are stored remotely and made available to the user over the Internet on demand." (Janice M Roehl-Anderson, "IT Best Practices for Financial Managers", 2010)

"A business model where programs, data storage, collaboration services, and other key business tools are stored on a centralized server that users access remotely, often through a browser." (Rod Stephens, "Start Here! Fundamentals of Microsoft .NET Programming", 2011)

"Technology that is rented or leased on a regular, or as-needed basis." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed, 2011)

"Using programs and data stored on servers connected to computers via the Internet rather than storing software and data on individual computers." (Gina Abudi & Brandon Toropov, "The Complete Idiot's Guide to Best Practices for Small Business", 2011)

"The delivery of computing as a service. Cloud computing applications rely on a network (typically the Internet) to provide users with shared resources, software, and data." (Craig S Mullins, "Database Administration", 2012)

"Using Internet-based resources (e.g., applications, servers, etc.) as opposed to buying and installing in-house." (Bill Holtsnider & Brian D Jaffe, "IT Manager's Handbook, 3rd Ed", 2012)

"A business strategy where part or all of an organization’s information processing and storage is done by online service providers." (Kenneth A Shaw, "Integrated Management of Processes and Information", 2013)

"A computing model that makes IT resources such as servers, middleware, and applications available as services to business organizations in a self-service manner." (Marcia Kaufman et al, "Big Data For Dummies", 2013)

"Computing resources provided over the Internet using a combination of virtual machines (VMs), virtual storage, and virtual networks." (Mark Rhodes-Ousley, "Information Security: The Complete Reference, Second Edition, 2nd Ed.", 2013)

"A model for network access in which large, scalable resources are provided via the Internet as a shared service to requesting users. Access, computing, and storage services can be obtained by users without the need to understand or control the location and configuration of the system. Users consume resources as a service, and pay only for the resources that are used." (Jim Davis & Aiman Zeid, "Business Transformation: A Roadmap for Maximizing Organizational Insights", 2014)

"The delivery of software and other computer resources as a service over the Internet, rather than as a stand-alone product." (Manish Agrawal, "Information Security and IT Risk Management", 2014)

"The provision of computational resources on demand via a network. Cloud computing can be compared to the supply of electricity and gas or the provision of telephone, television, and postal services. All of these services are presented to users in a simple way that is easy to understand without users' needing to know how the services are provided. This simplified view is called an abstraction. Similarly, cloud computing offers computer application developers and users an abstract view of services, which simplifies and ignores much of the details and inner workings. A provider's offering of abstracted Internet services is often called the cloud." (Robert F Smallwood, "Information Governance: Concepts, Strategies, and Best Practices", 2014)

"A computational paradigm that aims at supporting large-scale, high-performance computing in distributed environments via innovative metaphors such as resource virtualization and de-location." (Alfredo Cuzzocrea & Mohamed M Gaber, "Data Science and Distributed Intelligence", 2015)

"A computing model that makes IT resources such as servers, middleware, and applications available as services to business organizations in a self-service manner." (Judith S Hurwitz, "Cognitive Computing and Big Data Analytics", 2015)

"A delivery model for information technology resources and services that uses the Internet to provide immediately scalable and rapidly provisioned resources as services using a subscription or utility-based fee structure." (James R Kalyvas & Michael R Overly, "Big Data: A Businessand Legal Guide", 2015)

"A service that provides storage space and other resources on the Internet" (Nell Dale & John Lewis, "Computer Science Illuminated, 6th Ed.", 2015)

"Delivering hosted services over the Internet, which includes providing infrastructures, platforms, and software as services." (Mike Harwood, "Internet Security: How to Defend Against Attackers on the Web 2nd Ed.", 2015)

"The delivery of computer processing capabilities as a service rather than as a product, whereby shared resources, software, and information are provided to end users as a utility. Offerings are usually bundled as an infrastructure, platform, or software." (Adam Gordon, "Official (ISC)2 Guide to the CISSP CBK" 4th Ed., 2015)

"A general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS), and Analytics-as-a-Service (AaaS)."  (Suren Behari, "Data Science and Big Data Analytics in Financial Services: A Case Study", 2016)

"A type of Internet-based technology in which different services (such as servers, storage, and applications) are delivered to an organization’s or an individual’s computers and devices through the Internet." (Jonathan Ferrar et al, "The Power of People: Learn How Successful Organizations Use Workforce Analytics To Improve Business Performance", 2017)

"A form of distributed computing whereby many computers and applications share the same resources to work together, often across geographically separated areas, to provide a coherent service." (O Sami Saydjari, "Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time", 2018)

"Cloud computing is a general term for the delivery of hosted services over the Internet. Cloud computing enables companies to consume compute resources as a utility - just like electricity - rather than having to build and maintain computing infrastructures in-house." (Thomas Ochs & Ute A Riemann, "IT Strategy Follows Digitalization", 2018)

"Cloud computing refers to the provision of computational resources on demand via a network. Cloud computing can be compared to the supply of a utility like electricity, water, or gas, or the provision of telephone or television services. All of these services are presented to the users in a simple way that is easy to understand without the users’ needing to know how the services are provided. This simplified view is called an abstraction. Similarly, cloud computing offers computer application developers and users an abstract view of services, which simplifies and ignores many of the details and inner workings. A provider’s offering of abstracted Internet services is often called The Cloud." (Robert F Smallwood, "Information Governance for Healthcare Professionals", 2018)

"The delivery of computing services and resources such as the servers, storage, databases, networking, software, and analytic through the internet." (Babangida Zubairu, "Security Risks of Biomedical Data Processing in Cloud Computing Environment", 2018)

"The use of shared remote computing devices for the purpose of providing improved efficiencies, performance, reliability, scalability, and security." (Shon Harris & Fernando Maymi, "CISSP All-in-One Exam Guide" 8th Ed., 2018)

"A computing model that makes information technology resources such as servers, middleware, and applications available over the internet as services to business organizations in a self-service manner." (K Hariharanath, "BIG Data: An Enabler in Developing Business Models in Cloud Computing Environments", 2019)

"Cloud computing refers to the practice of using a network of remote servers, hosted on the Internet to manage, store and process data instead of using a local server or a personal computer." (Jurij Urbančič et al, "Expansion of Technology Utilization Through Tourism 4.0 in Slovenia", 2020)

"A standardized technology delivery capability (services, software, or infrastructure) delivered via internet-standard technologies in a pay-per-use, self-service way." (Forrester)

"Cloud computing is a style of computing in which scalable and elastic IT-enabled capabilities are delivered as a service using internet technologies." (Gartner)

Related Posts Plugin for WordPress, Blogger...

About Me

My photo
Koeln, NRW, Germany
IT Professional with more than 24 years experience in IT in the area of full life-cycle of Web/Desktop/Database Applications Development, Software Engineering, Consultancy, Data Management, Data Quality, Data Migrations, Reporting, ERP implementations & support, Team/Project/IT Management, etc.