Glossary

3D bioprinting
It is the medical application of 3D printing to produce living tissue and organs. Biotech firms are using 3D printing for tissue engineering applications where organs and body parts are built using inkjet techniques. Layers of living cells are deposited onto a gel medium and slowly built up to form three-dimensional structures.
3D printing
Also known as additive manufacturing, builds objects layer-by-layer to create real-world objects.
Adware
A software that embeds advertisements in the application. It is considered a legitimate alternative offered to consumers who do not wish to pay for software.
Agile
A very flexible iterative, incremental systems development methodology that overcomes the disadvantages of the Waterfall model.
Agility
Being able to respond quickly.
Always-on supply chain
An integrated set of supply networks characterized by a continuous, high-velocity flow of information and analytics creating predictive, actionable decisions to better serve the customer 24/7.
Application program interface (API)
An interface is the boundary where two separate systems meet. An API provides a standard way for different things, such as software, content, or websites, to talk to each other in a way that they both understand without extensive programming.
Attack vector
A path or means by which a hacker can gain access to a computer or network server in order to deliver a malicious outcome.
Augmented reality
A technology that superimposes a computer-generated image onto an image of the real world to provide information or entertainment.
Avatars
An icon, figure or visual representation of a person in computer games, simulations, virtual worlds or online discussion forms.
Back-office operations
They support the fulfillment of orders.
Balanced scorecard
A strategic management methodology for evaluating performance based on both financial and nonfinancial metrics.
Barcode
A machine-readable code consisting of numbers and a pattern of thick and thin lines that can be scanned to identify the object on which the code appears.
Baseline
A specification of the project plan that has been formally reviewed and agreed upon. It should be changed only through a formal change control process.
Big data
An extremely large data set that is too large or complex to be analyzed using traditional data processing techniques.
Big data analytics
Process of examining large and varied data sets to identify hidden patterns and correlations, market trends, customer preferences and other useful information to enable better business decisions.
Blogging platform
A software application used to create, edit, and add features to a blog. WordPress and Blogger are two of the most popular blogging platforms.
Bluetooth
A short-range wireless communications technology.
Breach of privacy
The loss of, unauthorized access to, or disclosure of, personal information.
Broadband
Wide bandwidth technologies that create fast, high-volume connections to the Internet and World Wide Web.
Business case
A presentation or document that outlines the justification for the start-up and funding of a project.
Business intelligence (BI)
A set of tools and techniques for acquiring and transforming raw data into meaningful and useful information for business analysis purposes in the forms of reports, dashboards, or interactive visualizations.
Business objectives
The building blocks of strategy.
Business process management
It consists of methods, tools, and technology to support and continuously improve business processes.
Business strategy
Sets the overall direction of a company, defines how a business will achieve its mission, goals, and objectives, and specifies the necessary financial requirements, budgets, and resources.
Business–IT alignment
Refers to applying IT in an appropriate and timely way that is consistent with business strategies, goals, and needs.
Centralized database
Stores all data in a single central compute such as a mainframe or server.
Channel conflict
Competition between a manufacturer’s distribution partners who sell through different channels. Channel conflict can occur at the wholesale, retail, or internal sales department level.
Click-through rates (CTRs)
Percentage of people who click on a hyperlinked area of a SERP or Web page.
Cloud service
Any computing resource that is provided over the Internet on demand.
Competitive advantage
Edge that enables a company to outperform its average competitor in ways that matter to its customers.
Computer networks
Set of computers connected together for the purpose of sharing resources.
Core business processes
They include accounting, finance, sales, marketing, human resources, inventory, productions, and manufacturing.
Crawler control module
A software program that controls a number of “spiders” responsible for scanning or crawling through information on the Web.
Critical infrastructure
Systems and assets, whether physical or virtual, so vital to the a country that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.
Critical path
The shortest time possible to complete all tasks required to finish the project. A delay of any task on the critical path will delay the project.
Crowdfunding
Raising funds for a project from the public, or crowd, via the Web.
Cyberthreat
A threat posed by means of the Internet (a.k.a. cyberspace) and the potential source of malicious attempts to damage or disrupt a computer network, system, or application.
Data analytics
Technique of qualitatively or quantitatively analyzing a data set to reveal patterns, trends, and associations that often relate to human behavior and interactions, to enhance productivity and business gain.
Database
Collection of data sets or records stored in a systematic way.
Database management system (DBMS)
Software used to manage the additions, updates, and deletions of data as transactions occur, and to support data queries and reporting. They are online transaction-processing (OLTP) systems.
Data breach
The successful retrieval of sensitive information by an individual, group, or software system.
Data
Describe products, customers, events, activities, and transactions that are recorded, classified, and stored.
Data governance
The control of enterprise data through formal policies and procedures to help ensure data can be trusted and are accessible.
Data incident
An attempted or successful unauthorized access to a network, system, or application; unwanted disruption or denial of service; unauthorized use of a system for processing or storage of data; changes to system without the owners knowledge, instruction, or consent.
Data management
The management of the flow of data from creation and initial storage to the time when the data become obsolete and are deleted.
Data silo
Stand-alone data stores. Their data are not accessible by other ISs that need it or outside that department.
Data visualization
Presentation of data in a graphical format to make it easier for decision-makers to grasp difficult concepts or identify new patterns in the data.
Deliverables
Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. Examples might be hardware, software, planning documents, or meeting minutes.
DevOps
A set of processes that encourages collaboration between system developers, operators and testers.
Digital dashboard
An electronic interface used to acquire and consolidate data across an organization.
Digital mesh
An expanded set of end points used to access applications, gather information, or interact with people, social communities, government, and businesses to ensure instant connection and response to build experience. Examples include smart devices, wearables, consumer and home electronic devices.
Digitization
The process of transforming any kind of activity or information into a digital format that can be collected, stored, searched, and analyzed electronically—and efficiently.
Dirty data
Poor-quality data that lacks integrity and cannot be trusted.
Discrimination
A biased or prejudicial treatment in recruitment, hiring, or employment based on certain characteristics, such as age, gender, and genetic information, and is illegal in the United States.
Distributed database
Stores portions of the database on multiple computers within a network.
Drill down
Searching for something on a computer moving from general information to more detailed information by focusing on something of interest, for example, quarterly sales—monthly sales—daily sales.
Edge service
A term that refers to a cloud service.
EEOC (Equal Employment Opportunity Commission)
It enforces federal laws prohibiting discrimination in employment.
Electronic fund transfer (EFT)
A transfer of funds from one bank account to another over a computerized network.
Electronic records management system (ERMS)
This system consists of hardware and software that manage and archive electronic documents and image paper documents; then index and store them according to company policy.
Electronic wallet (e-wallet)
A software application that can store encrypted information about a user’s credit cards, bank accounts, and other information necessary to complete electronic transactions, eliminating the need to re-enter the information during the transaction.
Enterprise data mashup
Combination of data from various business systems and external sources without relying on the middle step of ETL (extract, transform, and load) into a data warehouse or help from IT.
Enterprise data warehouses (EDWs)
Data warehouse that integrates data from databases across an entire enterprise.
Enterprise systems
Cross-functional and interorganizational systems that support the business strategy.
Exabyte
One quintillion bytes (1,000,000,000,000,000,000 Bytes) which is the equivalent of 1,000 petabytes of data or 7 trillion online video clips. Five Exabytes is equal to all words ever spoken by human beings.
Extreme programming
A pragmatic systems development to Agile development that emphasizes business results first and takes an incremental approach to building software, using continual testing and revision.
Financial Accounting Standards Board (FASB)
It establishes financial accounting and reporting standards for public and private companies and not-for-profit organizations.
Financial misrepresentation
It occurs when a company has intentionally deceived one or more other parties.
Flexibility
Means having the ability to quickly integrate new business functions or to easily reconfigure software or applications.
Folksonomy
A system of classifying and organizing online content into categories by the use of user-generated metadata such as keywords.
Fraud
A nonviolent crime in which fraudsters use deception, confidence, and trickery for their personal gain.
Front-office operations
Operations such as sales and advertising that are visible to customers.
Gantt chart
A horizontal bar chart that graphically displays the project schedule.
Geographic information system (GIS)
A computer-based tool that captures, stores, manipulates, analyzes, and visualizes geographic data on a map.
Geospatial data
Data that has an explicitly geographic component, ranging from vector and raster data to tabular data with site locations.
Go/no-go Decision
A determination to proceed with or abandon a plan or project.
Hacking
Broadly defined as intentionally accessing a computer without authorization or exceeding authorized access. Various state and federal laws govern computer hacking.
Hacktivist
Short for hacker-activist or someone who performs hacking to promote awareness for or otherwise support a social, political, economic, or other cause. Hacking an application, system, or network without authorization, regardless of motive, is a crime.
Inbound logistics
Refers to receiving inventory.
Income statement
Summarizes a company’s revenue and expenses for one quarter of a fiscal year or the entire fiscal year. It is also known as a P&L (profit and loss) or earnings statement.
Information
Data that have been processed, organized, or put into context so that they have meaning and value to the person receiving them.
Information management
The use of IT tools and methods to collect, process, consolidate, store, and secure data from sources that are often fragmented and inconsistent.
Information Systems (ISs)
A combination of information technology and people’s activities using the technology to support business processes, operations, management, and decision-making at different levels of the organization.
Informed user
A person knowledgeable about information systems and IT.
Intellectual property
A work or invention that is the result of creativity that has commercial value, including copyrighted property such as a blueprint, manuscript, or a design, and is protected by law from unauthorized use by others.
Interface
To connect to and exchange data with apps and systems.
Internet of Things (IoT)
Network of physical objects or “things” embedded with electronics, software, sensors, and network connectivity, that enables these objects to collect and exchange data.
Internet Protocol (IP)
Method by which data are sent from one device to another over a network.
Inventory control systems
Stock control or inventory management systems.
IP address
A unique identifier for each device that communicates with a network that identifies and locates each device. An IP address is comparable to a telephone number or home address.
IPOS
The cycle of inputting, processing, outputting, and storing information in an information system.
IP Version 4 (IPv4)
Has been Internet protocol for over three decades, but has reached the limits of its 32-bit address design. It is difficult to configure, it is running out of addressing space, and it provides no features for site renumbering to allow for an easy change of Internet Service Provider (ISP), among other limitations.
IP Version 6 (IPv6)
The most recent version of the Internet Protocol. IPv6 is replacing IPv4. IPv6 has a 128-bit address and allows 7.9 × 1028 times as many addresses as IPv4, which provides about 4.3 billion addresses.
IT strategy
A plan of action to create an organization’s IT capabilities for maximum and sustainable value in the organization.
Knowledge
Adds understanding, experience, accumulated learning, and expertise as they apply to a current problem or activity, to information.
Lagging indicators
They confirm what has happened. They evaluate outcomes and achievements.
Leading indicators
They predict future events to identify opportunities
Legacy systems
They are older information systems (ISs) that have been maintained over several decades because they fulfill critical needs.
Logical design
It lists and describes all the information resources (data and processes) and the scope of duties and responsibilities of consumers of the information involved in the operation of the new system. It is business focused and always precedes physical design.
Malware
Refers to hostile or intrusive software, including computer viruses, rootkits, worms, trojan horses, ransomware, and other malicious programs used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems.
Mashup
A general term referring to the integration of two or more technologies.
Mega trends
Forces that shape or create the future of business, the economy, and society.
Microblog
A blog that consists of frequent, but very brief posts containing text, pictures, or videos. Twitter is perhaps the most well-known example of a microblog.
Microsoft Cloud
Provides a hybrid infrastructure and capabilities to manage enterprise apps and data.
Milestones
They are used to manage the project work effort, monitor results, and report meaningful status to project stakeholders.
Millennials
Term used to describe people born between the early 1980s and the early 2000s.
Mission
Defines the organization’s purpose and what it hopes to achieve.
Mobile browser
A Web browser that is optimized to display Web content effectively on a small mobile device such as a smartphone.
Mobile location-based marketing
A marketing strategy that uses information from a mobile device’s GPS or customer’s mobile check-in on a social network to determine the content of marketing communications they receive on the device (e.g., advertisements, coupons, special offers).
Mobile visual search engine
A search engine that uses an image instead of a text-based query to search for information on the Web.
Near-field communication (NFC)
Enables two devices within close proximity to establish a communication channel and transfer data through radio waves.
Negligent hiring
The hiring of an employee when the employer knew or should have known about the employee’s background which, if known, indicates a dangerous or untrustworthy character.
Network effect
From the field of economics, the network effect explains how the perceived value of a product or service is affected by the number of people using the product or service.
Object-oriented (O-O)
An iterative systems analysis and design methodology that emphasizes modularity and reusability.
On-demand economy
The economic activity created by technology companies that fulfill consumer demand through the immediate provisioning of products and services.
Online transaction processing (OLTP) systems
Designed to manage transaction data, which are volatile.
Open Wi-Fi network
An unprotected Wi-Fi network found particularly in public places where you don’t know who else could be on the network.
Order fulfillment
Set of complex processes involved in providing customers with what they ordered on time and all customer services related to on-time delivery of a product.
Outbound logistics
Refers to shipping inventory.
Packet
A piece of a message that is collected and re-assembled with the other pieces of the same message at their destination. To improve communication performance and reliability, each larger message sent between two network devices is often subdivided into packets.
Page repository
A data structure that stores and manages information from a large number of Web pages, providing a fast and efficient means for accessing and analyzing the information at a later time.
People-first approach
It ensures that technology meets the needs of the users by involving the users at every stage of systems development.
Petabyte
A unit of measurement for digital data storage. A petabyte is equal to one million gigabytes.
Physical design
It transforms business requirements into a specific technological solution by identifying all physical servers and major technical components that will be used to support the desired business outcome.
Portfolio
The entire set of projects within a department or organization.
Post mortem
A method for evaluating project performance, identifying lessons learned, and making recommendations for future projects.
Privacy paradox
Refers to the competing demands of social media where users are concerned about privacy, but their willingness to disclose personal information does not mirror these concerns.
Program
A set of related projects.
Project
It is a well-planned sequential series of tasks to achieve a result. Projects have a defined beginning and end, a scope, resources, and a budget. Projects are approved before they are funded and allocated resources.
Project management
Application of knowledge, skills, tools, and techniques to project activities to meet project requirements.
Project management office (PMO)
An organizational group responsible for coordinating the project management function throughout an organization.
Projects
Temporary endeavors undertaken to create a unique product, service, or result.
Proof of concept (POC)
A vendor demonstration of a product to see how or how well it works.
Protected classes
Characteristics identified by law that cannot be used in the hiring process.
Query
Ad hoc (unplanned) user request for specific data.
Quick response (QR) code
A machine-readable code typically used to store a link to a URL or Web address that can be read by a mobile device.
Ransomware
A type of malware that is designed to block access to a computer system until a sum of money has been paid.
Responsibility matrix
Lets everyone know who is responsible for completion of tasks.
Responsiveness
Means that IT capacity can be easily scaled up or down as needed, which essentially requires cloud computing.
Risk
Probability of a threat successfully exploiting a vulnerability and the estimated cost of the loss or damage.
Risk register
Lists all known risks and their source, an estimation of unknown risks and the response to be taken to each risk.
Safety stock
Extra inventory used as a buffer to reduce the risk of stockouts. It is also called buffer stock.
Scope
The body of work that needs to be completed within a project to achieve a desired outcome.
Search engine
An application for locating Web pages or other content (e.g., documents, media files) on a computer network. Popular Web-based search engines include Google, Bing, and Yahoo.
Search engine marketing (SEM)
A collection of online marketing strategies and tactics that promote brands by increasing their visibility in SERPs through optimization and advertising.
Semantic Web
An extension of the World Wide Web that utilizes a variety of conventions and technologies that allow machines to understand the meaning of Web content.
Short message service (SMS)
A technology used to send and receive text messages on mobile devices via a telecommunications network.
Showrooming
The practice of examining products in a traditional retail store, sometimes with the help of a salesperson, and then purchasing the product online.
Social media
A collection of Web applications based on Web 2.0 technology and culture that allows people to connect and collaborate with others by creating and sharing digital content.
Social networking service (SNS)
An online platform or website that allows subscribers to interact and form communities or networks based on real-life relationships, shared interests, activities and so on.
Social recruitment
Refers to use of social media to find, screen, and select job candidates.
Spiders
Also known as crawlers, Web bots, or simply “bots,” spiders are small computer programs designed to perform automated, repetitive tasks over the Internet. They are used by search engines for scanning Web pages and returning information to be stored in a page repository.
Sprints
A set period of time during which specific work has to be completed and made ready for review. Traditionally, a sprint lasts 30 days.
Spyware
A tracking software that is not designed to intentionally damage or disable a system. For example, an employer may install spyware on corporate laptops to monitor employee browsing activities, or an advertiser might use cookies to track what Web pages a user visit in order to target advertising in a marketing campaign.
Standard operating procedures (SOPs)
A set of written instructions on how to perform a function or activity. SOPs provide the framework for complex processes to be managed more effectively.
Stockouts
Inventory shortage arising from unexpected demand, delays in scheduled delivery, production delays, or poor inventory management.
Strategic plan
A document used to communicate the company’s goals and the actions needed to achieve them.
Strategic planning
A series of processes in which an organization selects and arranges its businesses or services to keep the organization healthy or able to function even when unexpected events disrupt one or more of its businesses, markets, products, or services.
Strategic technology
The potential to make significant impacts on an organization’s long-term plans, programs, and initiatives.
Structured query language (SQL)
A standardized query language for accessing databases.
Sunk cost
A cost that has already been incurred and cannot be recovered.
Supply chain management (SCM)
Efficient management of the flows of material, data, and payments among the companies in the supply chain, from suppliers to consumers.
Supply chain
Starts with the acquisition of raw materials or the procurement (purchase) of products and proceeds through manufacture, transport, and delivery—and the disposal or recycling of products.
Synchronous communication
Dialogue or conversation that takes place in real time, without the long delays between exchanges that occur, for instance, in e-mail or discussion board conversations.
Templates
A sample document that already has some details in place.
Terms of service (TOS) agreement
A formal listing of the policies, liability limits, fees, user rights and responsibilities associated with using a particular service. Users are typically required to acknowledge they have read, understand, and agree to the TOS before they are allowed the service to use.
Trial run
When a vendor product or service is tested in a pilot study or limited area of the business to confirm its usefulness to the company.
Triple constraint
The combination of the three most significant elements of any project: scope, time and cost. It is also known as the iron triangle.
Trojan horse
A program that appears harmless, but is, in fact, malicious.
Tweet
A brief 140-character message or post broadcast on Twitter, a microblogging service.
Twittersphere
Universe of people who use Twitter, a microblogging service.
Use-case diagram
A graphic depiction of the major elements (use cases) within a system and it environment.
Use-case description
A text-based list of actions or steps that detail the interactions between users and the system needed to achieve the goal of the system.
Value-added reseller (VAR)
Customizes or adds features to a vendor’s software or equipment and resells the enhanced product.
Value driver
It enhances the value of a product or service to consumers, creating value for the company. Advanced IT, reliability, and brand reputation are examples.
Wardriving
The act of searching for Wi-Fi wireless networks by a person in a moving vehicle using a laptop or smartphone.
Waterfall Model
A sequential, predictive systems development methodology that is simple to use and understand, but inflexible.
Web 2.0
A term used to describe a phase of World Wide Web evolution characterized by dynamic Web pages, social media, mashup applications, broadband connectivity, and user-generated content.
Wi-Fi
The standard way computers connect to wireless networks.
Wisdom
A collection of values, ethics, moral codes, and prior experiences that form an evaluated understanding or common-sense judgment.
World Wide Web (WWW)
A network of documents on the Internet, called Web pages, constructed with HTML markup language that supports links to other documents and media (e.g., graphics, video, audio, etc.).
Yammer
It is “Facebook for business.” The platform has features similar to Facebook likes, newsfeeds, threaded conversation, and direct messaging. This private social channel helps employees, partners, and customers communicate; exchange information; and collaborate across departments, locations, and business apps.
Zettabytes
One sextillion bytes (1,000,000,000,000,000,000,000 Bytes) which is approximately equal to 1,000 Exabytes.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset