Sitemap

Welcome
Shop
Ihr Warenkorb
Allgemeine Geschäftsbedingungen
Mein Konto
Masterpläne - Starthilfe für Ihre Projekte
4servicemanagers
Detailed Glossaries
ITIL - Lexikographie
ITIL - Buchstabe A
Accounting
Accountmanager
Accredited
ACD Automatic Call Distribution
Active Monitoring
Activity - Aktivität
Agreed Service Time
Agreement
Analytical Modelling
Application
Alert
AMIS
Application Management
Application Portfolio
Application Sizing
Architektur
Application Service Provider
ASP
Assembly
Assessment
Asset
Asset Management
Asset Register
Attribute
Audit
Availability Management
Availability - Verfügbarkeit
Availability Plan
ITIlL- Buchstabe B
Back Out
Backup
Baseline
Benchmark
Benchmarking
Best Practice
Brainstorming
BSI
Budget
Budgeting
Build
Build Environment
BCM - Business Capacity Management
BCM - Business Continuity Management
BCP - Business Continuity Plan
Business Customer
BIA - Business Impact Analysis
Business Objective
Business Operation
Business Perspective
Business Process
Business Relationship Management
Business Relationship Manager
Business Service
Business Unit
Business
ITIL - Buchstabe C
CAB - Change Advisory Board
Call
Call Centre
Call Type
Capability
Capacity Management
Capacity
Capacity Plan
Capacity Planning
CAPEX
Capital Item
Capitalization
Category
Certification
Change
Change Case
Change History
Change Management
Change Model
Change Record
Change Schedule
Change Request
Change Window
Charging
Chronological Analysis
CI-Type
Classification
Client
Closed
Closure
CMDB - Configuration Management Database
CMIS - Capacity Management Information System
CMM
CMS - Configuration Management System
Code of Practice
Cold Standby
Concurrency
Confidentiality
Configuration
Configuration Baseline
Configuration Control
Configuration Structure
Configuration Record
Configuration Management
Configuration Identification
Continous Availability
Continous Operation
Continual Service Improvement
Continuity Management
Contract
Control Perspective
Control Processes
Core Service
Core Service Package
Cost
Cost Benefit Analysis
Cost Centre
Cost Effectivenes
Cost Element
Cost Type
Cost Unit
COTS
Continuity Plan
CCM - Component Capacity Management
Component
CFIA - Component Failure Impact Analysis
Component CI
CI Configuration Item
CRAMM
Course Corrections
Countermeasure
CSF - Critical Success Factor
Crisis Management
Customer
Customer Portfolio
Capacity Plan
Cost Management
Contract Portfolio
Control
CTI - Computer Telephony Integration
Culture
ITIL - Buchstabe D
Device
Development Environment
Development
Detection
Design
Depreciation
Dependency
Demand Management
Deliverable
DML
DIKW
Dashboard
Diagnosis
Diagnosis Script
Driver
Downtime
Document
Do Nothing
Directory Service
Direct Cost
Differential Charging
ITIL - Buchstabe E
External Customer
Expanded Incident Lifecycle
Exception Report
Event Management
Event
Evaluation
Estimation
eSourcing Capability Model for Client Organizations (eSCM-CL)
Escalation
Error
Environment
Emergency Change Advisory Board (ECAB)
External Metric
External Sourcing
Early Life Support
Economies of scale
Economies of scope
Effectiveness
End-to-End Monitoring
Efficiency
Emergency Change
ITIL - Buchstabe F
Failure Modes and Effects Analysis (FMEA)
Fast Recovery
Fault Tree Analysis (FTA)
Financial Management
First-line Support
Failure
Fishbone Diagram
Fit for Purpose
Fixed Cost
Fixed Facility
Follow the Sun
Fulfilment
Function
Functional Escalation
Fault
Facilities Management
Fault Tolerance
ITIL - Buchstabe G
Gap Analysis
Gradual Recovery
Governance
Guideline
ITIL - Buchstabe H
Hot Standby
High Availability
Hierarchic Escalation
Help Desk
ITIL - Buchstabe I
Infrastructure Service
IT Infrastructure
IT Operations
IT Operations Control
IT Operations Management
IT Service
IT Service Continuity Management (ITSCM)
IT Service Continuity Plan
IT Service Management Forum (itSMF)
IT Service Provider
IT Steering Group (ISG)
Information Security Management (ISM)
IT Directorate
Ishikawa Diagram
Internet Service Provider (ISP)
Information Technology (IT)
Insourcing
Integrity
Interactive Voice Response (IVR)
Information Security Policy
Intermediate Recovery
Internal Customer
Internal Metric
Internal Rate of Return (IRR)
Internal Service Provider
Internal Sourcing
Information Security Management System (ISMS)
Indirect Cost
Incident Record
Incident Management
Invocation
International Organization for Standardization (ISO)
Identity
Immediate Recovery
Impact
Incident
ITIL - Buchstabe J
Job Scheduling
Job Description
ITIL - Buchstabe K
Knowledge Management
Kano Model
Knowledge Base
Kepner & Tregoe Analysis
Known Error
Known Error Database (KEDB)
Known Error Record
ITIL - Buchstabe L
Lifecycle
Line of Service (LOS)
Live
Live Environment
ITIL - Buchstabe M
Maturity
Market Space
Marginal Cost
Manual Workaround
Management System
Management of Risk (MoR)
Management Information
Managed Services
Major Incident
Maintainability
Maturity Level
Model
Monitor Control Loop
Modelling
Mission Statement
Middleware
Metric
Mean Time to Restore Service (MTRS)
Mean Time To Repair (MTTR)
Mean Time Between Service Incidents (MTBSI)
Mean Time Between Failures (MTBF)
Monitoring
ITIL - Buchstabe N
Net Present Value (NPV)
Notional Charging
ITIL - Buchstabe O
Objective
Office of Government Commerce (OGC)
Operation
Operational
Operational Cost
Operational Expenditure (OPEX)
Operational Level Agreement (OLA)
Operations Bridge
Opportunity Cost
Optimise
Outcome
ITIL - Buchstabe P
Proactive Monitoring
Priority
PRINCE2
Prerequisite for Success (PFS)
Practice
Post Implementation Review (PIR)
Portable Facility
Policy
PMBOK
Planned Downtime
Plan
Proactive Problem Management
Problem
Problem Management
Projected Service Outage (PSO)
Project
Programme
Profit Centre
Production Environment
Process Owner
Process Manager
Process Control
Process
Procedure
Problem Record
Pilot
Performance Management
Pain Value Analysis
Pareto Principle
Partnership
Passive Monitoring
Pattern of Business Activity (PBA)
Percentage Utilisation
Performance
Performance Anatomy
ITIL - Buchstabe Q
Qualification
Quality
Quality Assurance (QA)
Quality Management System (QMS)
Quick Win
ITIL - Buchstabe R
Release and Deployment Management
Release Identification
Release Management
Release Process
Release Record
Release Unit
Release Window
Release
Relationship Processes
Redundancy
Responsibility
RACI
Reactive Monitoring
Reciprocal Arrangement
Record
Recovery
Recovery Option
Recovery Point Objective (RPO)
Recovery Time Objective (RTO)
Reliability
Remediation
Return to Normal
Review
Rights
Risk
Risk Assessment
Risk Management
Role
Rollout
Root Cause
Root Cause Analysis (RCA)
Return on Investment (ROI)
Retire
Repair
Request for Change (RFC)
Request Fulfilment
Requirement
Resilience
Resolution
Resource
Response Time
Responsiveness
Restore
ITIL - Buchstabe S
Service Analytics
Service Asset
Service Asset and Configuration Management (SACM)
Service Capacity Management (SCM)
Service Catalogue
Service Continuity Management
Service Acceptance Criteria (SAC)
Service
Separation of Concerns (SoC)
Security Policy
Security
Second-line Support
Scope
Scalability
Service Contract
Service Satisfaction Index
Standby
Standard Operating Procedures (SOP)
Standard Change
Standard
Stakeholder
Specification
Source
Snapshot
SMART
SLAM Chart
Single Point of Failure (SPOF)
Single Point of Contact
Simulation Modelling
Shift
Serviceability
Service Warranty
Statement of Requirements (SOR)
Status
SLO
System
Systems Management
Service Satisfaction
SWOT Analysis
Supporting Service
Support Hours
Support Group
Supplier Management
Supplier and Contract Database (SCD)
Supplier
Super User
Strategy
Strategic
Storage Management
Status Accounting
Service Valuation
Service Culture
Service Management
Service Maintenance Objective
Service Level Target
Service Level Requirement (SLR)
Service Level Package (SLP)
Service Level
Service Knowledge Management System (SKMS)
Service Improvement Plan (SIP)
Service Hours
Service Failure Analysis (SFA)
Service Desk
Service Design Package
Service Design
Service Level Target
Service Level Management (SLM)
Service Level Agreement (SLA)
Service Management Lifecycle
Service Manager
Service Utility
Service Validation and Testing
Service Transition
Service Strategy
Service Sourcing
Service Request
Service Reporting
Service Provisioning Optimization (SPO)
Service Provider Interface (SPI)
Service Provider
Service Owner
Service Package
Service Operation
Service Pipeline
Service Portfolio
Service Portfolio Management (SPM)
Service Potential
ITIL - Buchstabe T
Third-line Support
Third Party
Test Environment
Test
Terms of Reference (TOR)
Technical Service
Tactical
Technical Support
Tension Metrics
Tag
Technical Observation (TO)
Threat
Treshold
Transition
Transition Planning and Support
Trend Analysis
Tuning
Type I Service Provider
Type II Service Provider
Type III Service Provider
Transaction
Total Quality Management (TQM)
Technical Management
Total Cost of Utilization (TCU)
Total Cost of Ownership (TCO)
Throughput
ITIL - Buchstabe U
Use Case
Utility
User Profile (UP)
User
Urgency
Unit Cost
Underpinning Contract (UC)
Usability
ITIL - Buchstabe V
Value Network
Value on Investment (VOI)
Variable Cost
Variable Cost Dynamics
Variance
Verification
Verification and Audit
Version
Vision
Vital Business Function (VBF)
Vulnerability
Validation
Value Chain
Value for Money
ITIL - Buchstaben W-Z
Workaround
Warm Standby
Warranty
Work in Progress (WIP)
Work Instruction
Workload
IT - Controlling und Investmententscheide
Cashflow
Diskontierung
Kalkulationszinssatz
Diskontierungsfaktor
Zeitwert
Kapitalwert
IRR
CROI
Backfilling
Erfolgswirksame Ausgaben
CAPEX - Capial Expense
Auszahlungen
Einzahlungen
Aufwand
Ertrag - Revenue
EBIT
Fixe Kosten
Variable Kosten
Kapitalkosten - Cost of Capital
Primäkosten
Sekundärkosten
Tax Shield
OPEX - Operational Expense
ROI
EV - Earned Value
TVO
Bilanzwirksame Ausgaben - Expense Capitalized
DCF - Discounted Cash Flow
EBITDA
NPV - Net Present Value
TCO
Applied Information Economics
REJ
Lifecycle-Cost
Identity-Management
Access Control Lists (ACLs)
Adaptive enterprise
Attribute Authority (AA)
Attribute based access control (ABAC)
Biometrische Authentisierung
Certificate Authority (CA)
Challenge-Response
Chinese Wall Policy
COCO
Conflict- of- intressts classes (COI classes)
Datenklassifizierung
Datenzugriff
Directories
Directory Service Markup Language (DSML)
Discretionary Access Control (DAC)
European Data Protection Directive
EU-Richtlinie (EuroSOX)
Food and Drug Administration Rule 21 CFR11 (FDA)
FISMA
Generic IAM
Gramm-Leach Bliley Act (GLBA)
Health Information Portability and Accountability Act (HIPAA)
Identität
Identitätsdiebstahl
Identity Management
Identity Provider (IDP)
Identity Web Services Framework (ID-WSF)
i-Name
Liberty Alliance
Mandatory Access Control (MAC)
Named user
NIST
openLDAP
Open Source Security Testing Methodology Manual (OSSTMM)
Passel
Passwort
Policy Based Access Control (PBAC)
Phishing
Protection bits
Risk Exposure – Risiko Budget
Risk Assessment Values (RAVs)
Role-Based Access Control (RBAC)
Relative Destinguished Name (RDN)
Rechte- Matrix
Rechtetrennung
Risikokategorie
Role Mining
Simple Authentication and Security Layer (SASL)
SOD - Separation of Duties
Shibboleth
Single Sign On - SSO
Steganografie
Symmetrische und asymmetrische Verschlüsselung
The Laws of Identity
Transport Layer Security (TLS)
Turnbull- Guidance
Web Service Inbteroperability Organization (WS-I)
X.500
X.509
Extensible Resource Identifier (XRI)
Zertifikat
BPM-Subbegriffe
Reifegrad
KVP
BI - Business Intelligence
OLTP
Data Mining
OMS - Outputmanagementsystem
OLAP
WMS - Workflowmanagement System
NGOSS
eTOM
EFQM
CMS - Content-Management-System
ISO 9001
ISO 20000
BSC - Balanced Scorecard
BSM
ITSM
KPI - Key Performance Indicator
PDCA - Deming - Wheel
ISO 27001
IT-Alignment Subbegriffe
Produktivitätsparadoxon
SAM - Strategic Alignment Model
SAMM - Strategic Alignment Maturity Model
Zachman Framework
Opensource - Subbegriffe
KDE
GNOME
BSD - Berkeley Software Distribution
Apache
JBOSS
JAVA
J2EE
Webserver
Application Server
ODF - Open Document Format
Software-Patent
Embedded Linux
Free Software
GNU
Linux
Linux Distribution
GPL - Global Public Licence
Offshore - Subbegriffe
PEST-Methode
TDC-Matrix
Virtualisierung-Subbegriffe
Virtueller Server
SONA - Service Oriented Network Architectures
Virtuelles Storage
Virtueller PC
Virtuelles Netzwerk
Compliance-Subbegriffe
Online-Backup and Recording
Denial of Service
Spam
UTM - Unified Threat Management
GebüV
Secure Remote Access
Basel II
COSO
Solvency II
SOX - Chap. 404
Threat Management
Anti Spam
CMMI
CobIT
ECM-Subbegriffe
Collaboration
CTR Compliant Transaction Recording
CMS - Content Management System
DAM - Digital Asset Management
Dokumentenmanagement
Records Management
Langzeitarchivierung
ILM
DLM - Document Lifecycle Management
SOA-Subbegriffe
SOA - Prozessmanagement
BPR - Business Process Reengineering
Business Exception
BPMS
BPMN
Business Rule
BPML - Business Process Management Language
Business Logic
SOA - Projektmanagement
Lasttest
Dokumententest
Akzeptanztest
Komponententest
Systemtest
RUP - Rational Unified Process
UML - Unified Modelling Language
IAD - Iterative Application Development
Requirements Management
Modulare Programmierung
Maintainability
Extreme Programming
Spiral Model
Verteilte Programmierung
Objektorientierte Programmierung
Funktionale Programmierung
SOA - Kernbegriffe
Granularity - Granularität
Coupling - Kopplung
CORBA - Common Request Brokerage Architecture
IDL
MOM - Message Oriented Middleware
Service Contract - SOA
Code Generation
Choreography
Authorization - Autorisierung
Authentication
ACID
SAML - Security Assertion Markup Language
EJB Enterprise Java Beans
Integrität - Integrity
Registry - SOA-Kontext
LDAP
BPEL
AJAX
WACML
OASIS
UDDI
SOAP
MDM - Masterdatamanagement
Web-Service
ESB - Enterprise Service Bus
WSDL
Repository
SOA - Strategie und Architektur
Agility
Agile Enterprise
QoS
EAI
Legacy
Roadmap
Business Agility
Enterprise Architecture
Unternehmens-Bebauungsplan
Nicht zugeordnet
BS 7799
CMO - Current Mode of Operations
Housing and Hosting
BPO
TMO - Target Mode of Operation
Businesscase
Storage
4whatitis und Cascade IT - Info
Presse & Blog
News-Syndication