Welcome
Shop
Ihr Warenkorb
Mein Konto
Allgemeine Geschäftsbedingungen
Detailed Glossaries
ITIL - Lexikographie
ITIL - Buchstabe A
Accounting
Accountmanager
Accredited
ACD Automatic Call Distribution
Active Monitoring
Activity - Aktivität
Agreed Service Time
Agreement
Analytical Modelling
Application
Alert
AMIS
Application Portfolio
Application Management
Application Sizing
Architektur
Application Service Provider
ASP
Assembly
Assessment
Asset
Asset Management
Asset Register
Attribute
Audit
Availability Management
Availability - Verfügbarkeit
Availability Plan
ITIlL- Buchstabe B
Back Out
Backup
Baseline
Benchmark
Benchmarking
Best Practice
Brainstorming
BSI
Budget
Budgeting
Build
Build Environment
BCM - Business Capacity Management
BCM - Business Continuity Management
BCP - Business Continuity Plan
Business Customer
BIA - Business Impact Analysis
Business Objective
Business Operation
Business Perspective
Business Process
Business Relationship Management
Business Relationship Manager
Business Service
Business Unit
Business
ITIL - Buchstabe C
CAB - Change Advisory Board
Call
Call Centre
Call Type
Capability
Capacity Management
Capacity
Capacity Plan
Capacity Planning
CAPEX
Capital Item
Capitalization
Category
Certification
Change
Change Case
Change History
Change Management
Change Model
Change Record
Change Schedule
Change Request
Change Window
Charging
Chronological Analysis
CI-Type
Classification
Client
Closed
Closure
CMDB - Configuration Management Database
CMIS - Capacity Management Information System
CMM
CMS - Configuration Management System
Code of Practice
Cold Standby
Concurrency
Confidentiality
Configuration
Configuration Baseline
Configuration Control
Configuration Structure
Configuration Record
Configuration Management
Configuration Identification
Continous Availability
Continous Operation
Continual Service Improvement
Continuity Management
Contract
Control Perspective
Control Processes
Core Service
Core Service Package
Cost
Cost Benefit Analysis
Cost Centre
Cost Effectivenes
Cost Element
Cost Type
Cost Unit
COTS
Continuity Plan
Component
CCM - Component Capacity Management
CFIA - Component Failure Impact Analysis
Component CI
CI Configuration Item
CRAMM
Course Corrections
Countermeasure
CSF - Critical Success Factor
Crisis Management
Customer
Customer Portfolio
Capacity Plan
Cost Management
Contract Portfolio
Control
CTI - Computer Telephony Integration
Culture
ITIL - Buchstabe D
Development Environment
Design
Depreciation
Dependency
Demand Management
Deliverable
DML
DIKW
Dashboard
Downtime
Device
Detection
Development
Document
Driver
Do Nothing
Directory Service
Direct Cost
Differential Charging
Diagnosis Script
Diagnosis
ITIL - Buchstabe E
Effectiveness
Event
Event Management
Economies of scope
Exception Report
Efficiency
Evaluation
Estimation
eSourcing Capability Model for Client Organizations (eSCM-CL)
Escalation
Environment
Emergency Change Advisory Board (ECAB)
Emergency Change
Expanded Incident Lifecycle
External Customer
External Metric
Early Life Support
End-to-End Monitoring
Error
Economies of scale
External Sourcing
ITIL - Buchstabe F
Failure Modes and Effects Analysis (FMEA)
Fault
Fault Tree Analysis (FTA)
Financial Management
First-line Support
Failure
Fishbone Diagram
Fit for Purpose
Fixed Cost
Fixed Facility
Follow the Sun
Fulfilment
Function
Functional Escalation
Fault Tolerance
Facilities Management
Fast Recovery
ITIL - Buchstabe G
Gap Analysis
Gradual Recovery
Governance
Guideline
ITIL - Buchstabe H
Hot Standby
High Availability
Hierarchic Escalation
Help Desk
ITIL - Buchstabe I
IT Infrastructure
IT Operations
IT Operations Control
IT Operations Management
IT Service
IT Service Continuity Management (ITSCM)
IT Service Continuity Plan
Indirect Cost
IT Service Management Forum (itSMF)
IT Service Provider
IT Steering Group (ISG)
Information Security Management (ISM)
IT Directorate
Ishikawa Diagram
Information Security Policy
Infrastructure Service
Insourcing
Integrity
Invocation
Interactive Voice Response (IVR)
Intermediate Recovery
Internal Customer
Internal Metric
Internal Rate of Return (IRR)
Information Security Management System (ISMS)
Internal Sourcing
International Organization for Standardization (ISO)
Information Technology (IT)
Incident Record
Incident Management
Internet Service Provider (ISP)
Internal Service Provider
Identity
Immediate Recovery
Impact
Incident
ITIL - Buchstabe J
Job Description
Job Scheduling
ITIL - Buchstabe K
Knowledge Management
Knowledge Base
Kepner & Tregoe Analysis
Kano Model
Known Error
Known Error Database (KEDB)
Known Error Record
ITIL - Buchstabe L
Live
Live Environment
Line of Service (LOS)
Lifecycle
ITIL - Buchstabe M
Maturity
Market Space
Marginal Cost
Manual Workaround
Management System
Management of Risk (MoR)
Management Information
Managed Services
Major Incident
Maintainability
Maturity Level
Mean Time Between Failures (MTBF)
Mean Time Between Service Incidents (MTBSI)
Monitor Control Loop
Modelling
Model
Mission Statement
Middleware
Metric
Mean Time to Restore Service (MTRS)
Mean Time To Repair (MTTR)
Monitoring
ITIL - Buchstabe N
Net Present Value (NPV)
Notional Charging
ITIL - Buchstabe O
Objective
Office of Government Commerce (OGC)
Operation
Operational
Operational Cost
Operational Expenditure (OPEX)
Operational Level Agreement (OLA)
Operations Bridge
Opportunity Cost
Optimise
Outcome
ITIL - Buchstabe P
Proactive Problem Management
Proactive Monitoring
Priority
PRINCE2
Prerequisite for Success (PFS)
Practice
Post Implementation Review (PIR)
Portable Facility
Policy
PMBOK
Problem
Problem Management
Problem Record
Projected Service Outage (PSO)
Project
Programme
Profit Centre
Production Environment
Process Owner
Process Manager
Process Control
Process
Procedure
Planned Downtime
Plan
Pilot
Pain Value Analysis
Pareto Principle
Partnership
Passive Monitoring
Pattern of Business Activity (PBA)
Percentage Utilisation
Performance
Performance Anatomy
Performance Management
ITIL - Buchstabe Q
Qualification
Quality
Quality Assurance (QA)
Quality Management System (QMS)
Quick Win
ITIL - Buchstabe R
Release and Deployment Management
Release Identification
Release Management
Release Process
Release Record
Release Unit
Release Window
Release
Relationship Processes
Redundancy
Responsibility
RACI
Reactive Monitoring
Reciprocal Arrangement
Record
Recovery
Recovery Option
Recovery Point Objective (RPO)
Recovery Time Objective (RTO)
Reliability
Remediation
Return to Normal
Review
Rights
Risk
Risk Assessment
Risk Management
Role
Rollout
Root Cause
Root Cause Analysis (RCA)
Return on Investment (ROI)
Retire
Repair
Request for Change (RFC)
Request Fulfilment
Requirement
Resilience
Resolution
Resource
Response Time
Responsiveness
Restore
ITIL - Buchstabe S
Service Analytics
Service Asset
Service Asset and Configuration Management (SACM)
Service Capacity Management (SCM)
Service Catalogue
Service Continuity Management
Service Acceptance Criteria (SAC)
Service
Separation of Concerns (SoC)
Security Policy
Security
Second-line Support
Scope
Scalability
Service Contract
Service Satisfaction Index
Standby
Standard Operating Procedures (SOP)
Standard Change
Standard
Stakeholder
Specification
Source
Snapshot
SMART
SLAM Chart
Single Point of Failure (SPOF)
Single Point of Contact
Simulation Modelling
Shift
Serviceability
Service Warranty
Statement of Requirements (SOR)
Status
SLO
System
Systems Management
Service Satisfaction
SWOT Analysis
Supporting Service
Support Hours
Support Group
Supplier Management
Supplier and Contract Database (SCD)
Supplier
Super User
Strategy
Strategic
Storage Management
Status Accounting
Service Valuation
Service Culture
Service Management
Service Maintenance Objective
Service Level Target
Service Level Requirement (SLR)
Service Level Package (SLP)
Service Level
Service Knowledge Management System (SKMS)
Service Improvement Plan (SIP)
Service Hours
Service Failure Analysis (SFA)
Service Desk
Service Design Package
Service Design
Service Level Target
Service Level Management (SLM)
Service Level Agreement (SLA)
Service Management Lifecycle
Service Manager
Service Utility
Service Validation and Testing
Service Transition
Service Strategy
Service Sourcing
Service Request
Service Reporting
Service Provisioning Optimization (SPO)
Service Provider Interface (SPI)
Service Provider
Service Owner
Service Package
Service Operation
Service Pipeline
Service Portfolio
Service Portfolio Management (SPM)
Service Potential
ITIL - Buchstabe T
Tension Metrics
Third-line Support
Third Party
Test Environment
Test
Tactical
Tag
Terms of Reference (TOR)
Technical Observation (TO)
Technical Service
Threat
Treshold
Throughput
Transition
Transition Planning and Support
Technical Support
Trend Analysis
Tuning
Type I Service Provider
Type II Service Provider
Type III Service Provider
Transaction
Total Quality Management (TQM)
Technical Management
Total Cost of Utilization (TCU)
Total Cost of Ownership (TCO)
ITIL - Buchstabe U
Usability
Utility
User Profile (UP)
User
Urgency
Unit Cost
Underpinning Contract (UC)
Use Case
ITIL - Buchstabe V
Value Network
Value on Investment (VOI)
Variable Cost
Variable Cost Dynamics
Variance
Verification
Verification and Audit
Version
Vision
Vital Business Function (VBF)
Vulnerability
Validation
Value Chain
Value for Money
ITIL - Buchstaben W-Z
Workaround
Warm Standby
Warranty
Work in Progress (WIP)
Work Instruction
Workload
IT - Controlling und Investmententscheide
Kalkulationszinssatz
Cashflow
Diskontierung
Diskontierungsfaktor
Zeitwert
Kapitalwert
IRR
CROI
Auszahlungen
Backfilling
CAPEX - Capial Expense
Erfolgswirksame Ausgaben
Einzahlungen
Aufwand
Ertrag - Revenue
Bilanzwirksame Ausgaben - Expense Capitalized
EBIT
Variable Kosten
Primäkosten
Sekundärkosten
Tax Shield
OPEX - Operational Expense
ROI
EV - Earned Value
Lifecycle-Cost
NPV - Net Present Value
EBITDA
Fixe Kosten
Kapitalkosten - Cost of Capital
DCF - Discounted Cash Flow
REJ
TVO
TCO
Applied Information Economics
Identity-Management
Access Control Lists (ACLs)
Adaptive enterprise
Attribute Authority (AA)
Attribute based access control (ABAC)
Biometrische Authentisierung
Certificate Authority (CA)
Challenge-Response
Chinese Wall Policy
COCO
Conflict- of- intressts classes (COI classes)
Datenklassifizierung
Datenzugriff
Directories
Directory Service Markup Language (DSML)
Discretionary Access Control (DAC)
European Data Protection Directive
EU-Richtlinie (EuroSOX)
Food and Drug Administration Rule 21 CFR11 (FDA)
FISMA
Generic IAM
Gramm-Leach Bliley Act (GLBA)
Health Information Portability and Accountability Act (HIPAA)
Identität
Identitätsdiebstahl
Identity Management
Identity Provider (IDP)
Identity Web Services Framework (ID-WSF)
i-Name
Liberty Alliance
Mandatory Access Control (MAC)
Named user
NIST
openLDAP
Open Source Security Testing Methodology Manual (OSSTMM)
Passel
Passwort
Policy Based Access Control (PBAC)
Phishing
Protection bits
Risk Exposure – Risiko Budget
Risk Assessment Values (RAVs)
Role-Based Access Control (RBAC)
Relative Destinguished Name (RDN)
Rechte- Matrix
Rechtetrennung
Risikokategorie
Role Mining
Simple Authentication and Security Layer (SASL)
SOD - Separation of Duties
Shibboleth
Single Sign On - SSO
Steganografie
Symmetrische und asymmetrische Verschlüsselung
The Laws of Identity
Transport Layer Security (TLS)
Turnbull- Guidance
Web Service Inbteroperability Organization (WS-I)
X.500
X.509
Extensible Resource Identifier (XRI)
Zertifikat
BPM-Subbegriffe
KVP
EFQM
WMS - Workflowmanagement System
eTOM
NGOSS
BI - Business Intelligence
OMS - Outputmanagementsystem
CMS - Content-Management-System
Reifegrad
OLTP
OLAP
Data Mining
ISO 9001
ISO 20000
BSC - Balanced Scorecard
BSM
ITSM
KPI - Key Performance Indicator
PDCA - Deming - Wheel
ISO 27001
IT-Alignment Subbegriffe
SAMM - Strategic Alignment Maturity Model
Zachman Framework
SAM - Strategic Alignment Model
Produktivitätsparadoxon
Opensource - Subbegriffe
Application Server
ODF - Open Document Format
Linux Distribution
GPL - Global Public Licence
Embedded Linux
Webserver
J2EE
Linux
Free Software
Software-Patent
KDE
GNOME
BSD - Berkeley Software Distribution
GNU
Apache
JAVA
JBOSS
Offshore - Subbegriffe
PEST-Methode
TDC-Matrix
Virtualisierung-Subbegriffe
Virtueller Server
SONA - Service Oriented Network Architectures
Virtuelles Storage
Virtueller PC
Virtuelles Netzwerk
Compliance-Subbegriffe
Online-Backup and Recording
Denial of Service
Spam
UTM - Unified Threat Management
GebüV
Secure Remote Access
Basel II
COSO
Solvency II
SOX - Chap. 404
Threat Management
Anti Spam
CMMI
CobIT
ECM-Subbegriffe
Records Management
ILM
DAM - Digital Asset Management
CTR Compliant Transaction Recording
Dokumentenmanagement
CMS - Content Management System
Langzeitarchivierung
Collaboration
DLM - Document Lifecycle Management
SOA-Subbegriffe
SOA - Prozessmanagement
BPR - Business Process Reengineering
Business Exception
BPMS
BPMN
Business Rule
BPML - Business Process Management Language
Business Logic
SOA - Projektmanagement
Lasttest
Dokumententest
Akzeptanztest
Komponententest
Systemtest
RUP - Rational Unified Process
UML - Unified Modelling Language
IAD - Iterative Application Development
Requirements Management
Modulare Programmierung
Maintainability
Extreme Programming
Spiral Model
Verteilte Programmierung
Objektorientierte Programmierung
Funktionale Programmierung
SOA - Kernbegriffe
ACID
CORBA - Common Request Brokerage Architecture
IDL
MOM - Message Oriented Middleware
Granularity - Granularität
Coupling - Kopplung
Service Contract - SOA
Code Generation
Authorization - Autorisierung
SAML - Security Assertion Markup Language
Choreography
Authentication
EJB Enterprise Java Beans
Integrität - Integrity
LDAP
Registry - SOA-Kontext
BPEL
AJAX
WACML
OASIS
UDDI
SOAP
MDM - Masterdatamanagement
Web-Service
ESB - Enterprise Service Bus
WSDL
Repository
SOA - Strategie und Architektur
Agility
Agile Enterprise
QoS
EAI
Legacy
Roadmap
Business Agility
Enterprise Architecture
Unternehmens-Bebauungsplan
Nicht zugeordnet
BS 7799
CMO - Current Mode of Operations
Housing and Hosting
BPO
TMO - Target Mode of Operation
Businesscase
Storage
Presse & Blog
Medien Archiv

Über uns

4whatitis steht als eingetragene Wortmarke  für die Bereitstellung von Wissenselementen, Prozessvorlagen, Tools und Templates zum IT-Sourcing, Prozess- und Servicemanagement.
weitere Informationen >>

News

Kontakt

Newsletter abbonieren

Bitte E-Mail Adresse für Newsletter-Anmeldung angeben.