The Business of IT Blog

Enterprise IT Glossary

Muhammad Raza
8 minute read
Muhammad Raza
image_pdfimage_print

Welcome to the BMC Enterprise IT Glossary. We’ve rounded up some of the most popular technology terms and theories—those that are commonly used, misunderstood, or essential to IT strategy. From old standbys to cutting-edge areas, we’ve got you covered with short, understandable definitions and links to relevant articles that go deeper on the given topic.

If you’d like to see a topic added to this list, please email us at blogs@bmc.com.

A B C D E F G H I J K L M N O P Q R S T U V Q X Y Z

Get the IT Buyer’s Guide for Service & Operations

This IT Buyer’s Guide helps you understand what to look for and how to choose the right tools for IT service and operations.

Agile software development

A set of ITSM framework practices aligned with the principles of the Agile Manifesto. The software development approach follows iterative processes with changing requirements to deliver improved value at speed. Cross-functional teams self-organize and collaborate to achieve the collective goals with an incremental development strategy.

Read more:

Artificial intelligence

Historically a subset of computer science and statistics, artificial intelligence today is the idea that machines could mimic actual human capabilities, such as decision making. Modern AI is broken into two areas: general AI and applied AI. The concept of AI grows and shifts as technology advances, and likely will continue to do so. Currently the only solid criterion for AI success or failure is how it can accomplish applied tasks.

Read more:

Artificial intelligence in IT Operations (AIOps)

The use of artificial intelligence to support IT Operations functions in complex data and network environments. AIOps brings insightful decision-making capabilities to monitoring, service desk and automation functions of the ITSM strategy across hybrid on-premise and multi-cloud datacenter environments.

Read more:

Availability

The probability that a system performs correctly at a specific time instance. The service must be operational and adequately satisfy the defined dependency requirements at the time of its usage.

Read more:

Change management

The ITSM discipline focused on controlling the change lifecycle. It includes standardized processes and automation technologies to support change planning, implementation and management activities. The goal of change management is to manage risk and reduce disruption to IT infrastructure operations and services due to change processes.

Read more:

Chargeback

A company that implements an IT chargeback policy is actually billing each department for the number of technology resources used for a given period. Organizations might use IT chargebacks in order to hold departments accountable, gain insights into how departments use resources, and respond to resource needs with agility. This is a controversial process since, in most cases, departments don’t have to pay for usage of things like utilities and other company resources.

Read more:

Containerization

An OS-level virtualization method that organizes multiple microservices containers and application layers running isolated workload processes.

Read more:

Continuous integration

The process of integrating code changes in a centralized repository on a continuous basis using automation tools for build validation and configuration operations.

Read more:

Continuous delivery

The process of delivering continuously integrated code changes to production environment following automated testing for performance and functionality. The build is manually reviewed and approved before releasing to end-users.

Read more:

Continuous deployment

The process of automatically releasing code changes to end-users once the functional and validated release cycle is completed. No manual review or approval is required.

Read more:

Data fabric

A converged platform architecture and capabilities supporting diverse data management needs and delivering the right IT service levels across all disparate data sources and infrastructure types. It operates as a consolidated framework to manage, move and protect data across multiple isolated and incompatible data center deployments.

Read more:

DevOps

DevOps characterizes the combination of practices, tooling and cultural shift that enable efficient and effective IT service delivery and software release cycle through the adoption of Agile and Lean principles.

Read more:

Edge computing

The computational processing of sensor data away from the centralized nodes and close to the logical edge of the network, toward the original sources of data. Instead of processing the information in centralized network systems, the processing power is decentralized at the network edge to deliver real-time data processing capability.

Read more:

EXTech

Short for “employee experience technology”, EXTech pulls from fields like neuroscience, behavioral economics, and positive psychology to motivate individuals and encourage desired behaviors. Defined by Gartner as “a diverse collection of employee-facing solutions designed to influence and improve the employee experience and organizational culture,” EXTech isn’t only about engagement. EXTech solutions are meant to support the entire employee experience.

Read more:

General Data Protection Regulation (GDPR)

A unified data protection law designed to protect the privacy of individuals in the EU. GDPR includes a set of guidelines governing the collection and processing of user data that empowers data subjects with control over the use of their personal information. The legal framework also mandates quick, effective and transparent response to data breach incidents.

Read more:

Hyper-converged infrastructure

Software-defined hypervisor level combination of networking, server and storage services into a single datacenter application that is decoupled from the underlying infrastructure operations.

Read more:

Incident management

The ITSM discipline focused on maintaining optimal service operations. The goal of incident management is to reduce the risk of IT incidents and expediting service restoration following an incident of service disruption.

Read more:

Intelligent edge

A growing system connected devices that aggregate, process, and address data at the logical edge of the network closer to the original data sources.

Read more:

ITIL® (formerly known as IT Infrastructure Library)

An IT Service Management framework that provides best practice guidelines on aligning IT services with organizational goals. The guidelines encompass all activities, including policies and processes associated with IT service delivery and management across their lifecycle.

Read more:

IT Service Management (ITSM)

A concept designed to maximize business value through efficient and effective use of IT services and solutions. ITSM is based on the principle of continuous improvement and leverages a range of frameworks to realize these goals in various enterprise IT environments and business use cases.

Read more:

Mean time to detection (MTTD)

The average time elapsed between the occurrence of a component failure and its detection.

 

Read more:

Mean time between failure (MTBF)

The average time duration between inherent failures of a repairable system component. The following formulae are used to calculate MTBF:

 

Read more:

Mean time to failure (MTTF)

The average time duration before a non-repairable system component fails. The following formula is used to calculate MTTF:

 

Read more:

Mean time to recovery (MTTR)

The average time duration to fix a failed component and return to operational state. This metric includes the time spent during the alert and diagnostic process before repair activities are initiated. (The average time solely spent on the repair process is called mean time to repair.)

Read more:

Mean time to repair (MTTR)

The measure of time it takes to get a product or subsystem up and running after a failure.

 

Read more:

Mean time to resolve (MTTR)

The average time duration to fix a failed component and return to an operational state. This metric includes the time spent during the alert and diagnostic processes, before repair activities are initiated.

 

 

Read more:

Microservices architecture

The software design approach that develops applications as a combination of single-function, modular and loosely coupled components that can be deployed independently with dedicated interfaces and operations.

Read more:

Monolithic architecture

The traditional software design approach that combines all interconnected and interdependent software components into a single autonomous unit.

Read more:

Reliability

The probability that a system performs correctly during a specific time duration. During this correct operation, no repair is required or performed, and the system adequately follows the defined performance specifications.

Read more:

Service level agreement (SLA)

A documented agreement between a service provider and a customer that identifies both services required and the expected level of service. The service is measured in terms of specific quantifiable metrics that represent end-user experience of service dependency. The agreement defines the responsibilities and liabilities of the service provider in adequately meeting the expected service levels.

Read more:

Shadow IT

The use of IT solutions and services without organizational approval and support. The practice implies that IT governance protocols are bypassed by the workforce to access and communicate business information with solutions and services without informing appropriate stakeholders.

Read more:

Showback

IT showbacks offer departmental visibility into IT resource usage without charging departments for their use. When a company uses showbacks, it sends a document (similar to a billing statement) to each department indicating that department’s IT usage. That department, however, isn’t expected to pay for it.

Read more:

Site reliability engineering (SRE)

SRE is a methodology designed to ensure continuous operations of cloud-enabled infrastructure, solutions, and services. An SRE job typically combines engineering or development tasks with IT operations tasks.

Read more:

Tickets per user

One of many service desk metrics, tickets per user accounts for support volume, efficiency, and engagement quality that your service desk agents provide in response to customer demands.

Read more:

 

Access the Gartner Magic Quadrant for ITSM

The Gartner Magic Quadrant for ITSM is the gold-standard resource helping you understand the strengths of major ITSM software vendors, insights into platform capabilities, integration opportunities, and many other factors to determine which solution best fits your needs.


These postings are my own and do not necessarily represent BMC's position, strategies, or opinion.

See an error or have a suggestion? Please let us know by emailing blogs@bmc.com.

Run and Reinvent Your Business with BMC

From core to cloud to edge, BMC delivers the software and services that enable nearly 10,000 global customers, including 84% of the Forbes Global 100, to thrive in their ongoing evolution to an Autonomous Digital Enterprise.
Learn more about BMC ›

About the author

Muhammad Raza

Muhammad Raza

Muhammad Raza is a Stockholm-based technology consultant working with leading startups and Fortune 500 firms on thought leadership branding projects across DevOps, Cloud, Security and IoT.