The Business of IT Blog

Enterprise IT Glossary

Muhammad Raza
7 minute read
Muhammad Raza
image_pdfimage_print

Welcome to the BMC Enterprise IT Glossary. We’ve rounded up some of the most popular technology terms and theories—those that are commonly used, misunderstood, or essential to IT strategy. From old standbys to cutting-edge areas, we’ve got you covered with short, understandable definitions and links to relevant articles that go deeper on the given topic.

If you’d like to see a topic added to this list, please email us at blogs@bmc.com.

A B C D E F G H I J K L M N O P Q R S T U V Q X Y Z

Agile software development

A set of ITSM framework practices aligned with the principles of the Agile Manifesto. The software development approach follows iterative processes with changing requirements to deliver improved value at speed. Cross-functional teams self-organize and collaborate to achieve the collective goals with an incremental development strategy.

Read more:

Artificial intelligence

Historically a subset of computer science and statistics, artificial intelligence today is the idea that machines could mimic actual human capabilities, such as decision making. Modern AI is broken into two areas: general AI and applied AI. The concept of AI grows and shifts as technology advances, and likely will continue to do so. Currently the only solid criterion for AI success or failure is how it can accomplish applied tasks.

Read more:

Artificial intelligence in IT Operations (AIOps)

The use of artificial intelligence to support IT Operations functions in complex data and network environments. AIOps brings insightful decision-making capabilities to monitoring, service desk and automation functions of the ITSM strategy across hybrid on-premise and multi-cloud datacenter environments.

Read more:

Availability

The probability that a system performs correctly at a specific time instance. The service must be operational and adequately satisfy the defined dependency requirements at the time of its usage.

Read more:

Change management

The ITSM discipline focused on controlling the change lifecycle. It includes standardized processes and automation technologies to support change planning, implementation and management activities. The goal of change management is to manage risk and reduce disruption to IT infrastructure operations and services due to change processes.

Read more:

Containerization

An OS-level virtualization method that organizes multiple microservices containers and application layers running isolated workload processes.

Read more:

Continuous integration

The process of integrating code changes in a centralized repository on a continuous basis using automation tools for build validation and configuration operations.

Read more:

Continuous delivery

The process of delivering continuously integrated code changes to production environment following automated testing for performance and functionality. The build is manually reviewed and approved before releasing to end-users.

Read more:

Continuous deployment

The process of automatically releasing code changes to end-users once the functional and validated release cycle is completed. No manual review or approval is required.

Read more:

Data fabric

A converged platform architecture and capabilities supporting diverse data management needs and delivering the right IT service levels across all disparate data sources and infrastructure types. It operates as a consolidated framework to manage, move and protect data across multiple isolated and incompatible data center deployments.

Read more:

DevOps

DevOps characterizes the combination of practices, tooling and cultural shift that enable efficient and effective IT service delivery and software release cycle through the adoption of Agile and Lean principles.

Read more:

Edge computing

The computational processing of sensor data away from the centralized nodes and close to the logical edge of the network, toward the original sources of data. Instead of processing the information in centralized network systems, the processing power is decentralized at the network edge to deliver real-time data processing capability.

Read more:

General Data Protection Regulation (GDPR)

A unified data protection law designed to protect the privacy of individuals in the EU. GDPR includes a set of guidelines governing the collection and processing of user data that empowers data subjects with control over the use of their personal information. The legal framework also mandates quick, effective and transparent response to data breach incidents.

Read more:

Hyper-converged infrastructure

Software-defined hypervisor level combination of networking, server and storage services into a single datacenter application that is decoupled from the underlying infrastructure operations.

Read more:

Incident management

The ITSM discipline focused on maintaining optimal service operations. The goal of incident management is to reduce the risk of IT incidents and expediting service restoration following an incident of service disruption.

Read more:

Intelligent edge

A growing system connected devices that aggregate, process, and address data at the logical edge of the network closer to the original data sources.

Read more:

ITIL® (formerly known as IT Infrastructure Library)

An IT Service Management framework that provides best practice guidelines on aligning IT services with organizational goals. The guidelines encompass all activities, including policies and processes associated with IT service delivery and management across their lifecycle.

Read more:

IT Service Management (ITSM)

A concept designed to maximize business value through efficient and effective use of IT services and solutions. ITSM is based on the principle of continuous improvement and leverages a range of frameworks to realize these goals in various enterprise IT environments and business use cases.

Read more:

Mean time to detection (MTTD)

The average time elapsed between the occurrence of a component failure and its detection.

 

Read more:

Mean time between failure (MTBF)

The average time duration between inherent failures of a repairable system component. The following formulae are used to calculate MTBF:

 

Read more:

Mean time to failure (MTTF)

The average time duration before a non-repairable system component fails. The following formula is used to calculate MTTF:

 

Read more:

Mean time to recovery (MTTR)

The average time duration to fix a failed component and return to operational state. This metric includes the time spent during the alert and diagnostic process before repair activities are initiated. (The average time solely spent on the repair process is called mean time to repair.)

Read more:

Mean time to repair (MTTR)

The measure of time it takes to get a product or subsystem up and running after a failure.

 

Read more:

Mean time to resolve (MTTR)

The average time duration to fix a failed component and return to an operational state. This metric includes the time spent during the alert and diagnostic processes, before repair activities are initiated.

 

 

Read more:

Microservices architecture

The software design approach that develops applications as a combination of single-function, modular and loosely coupled components that can be deployed independently with dedicated interfaces and operations.

Read more:

Monolithic architecture

The traditional software design approach that combines all interconnected and interdependent software components into a single autonomous unit.

Read more:

Reliability

The probability that a system performs correctly during a specific time duration. During this correct operation, no repair is required or performed, and the system adequately follows the defined performance specifications.

Read more:

Service level agreement (SLA)

A documented agreement between a service provider and a customer that identifies both services required and the expected level of service. The service is measured in terms of specific quantifiable metrics that represent end-user experience of service dependency. The agreement defines the responsibilities and liabilities of the service provider in adequately meeting the expected service levels.

Read more:

Shadow IT

The use of IT solutions and services without organizational approval and support. The practice implies that IT governance protocols are bypassed by the workforce to access and communicate business information with solutions and services without informing appropriate stakeholders.

Read more:

BMC Helix: The Future of Service Management

BMC Helix ITSM is the industry-leading service management tool that uses cognitive automation technologies, delivered on your choice of cloud.


These postings are my own and do not necessarily represent BMC's position, strategies, or opinion.

See an error or have a suggestion? Please let us know by emailing blogs@bmc.com.

Run and Reinvent Your Business with BMC

BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for six years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe. Learn more about BMC ›

About the author

Muhammad Raza

Muhammad Raza

Muhammad Raza is a Stockholm-based technology consultant working with leading startups and Fortune 500 firms on thought leadership branding projects across DevOps, Cloud, Security and IoT.