Software asset management (SAM) is a business practice that involves managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an…
Encryption
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those…
Virtualization
In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and…
GIS
A geographic information system (GIS) is a system designed to capture, store, manipulate, analyze, manage, and present spatial or geographic data. The acronym GIS is…
Business Intelligence
Business intelligence (BI) comprises the strategies and technologies used by enterprises for the data analysis of business information. BI technologies provide historical, current and predictive…
ERP
Enterprise resource planning (ERP) is the integrated management of core business processes, often in real-time and mediated by software and technology. ERP is usually referred…
DMS
A document management system (DMS) is a system (based on computer programs in the case of the management of digital documents) used to track, manage…
Active Directory
Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a…
DWH
In computing, a data warehouse (DW or DWH), also known as an enterprise data warehouse (EDW), is a system used for reporting and data analysis,…
CMS
A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. CMS features vary…