Service Desk

Service Desk Servicedesk is a term used to describe a centralized point of contact for IT services and support. It is a customer service-oriented system that provides users with a…

Peter Jones

Blackbox

Blackbox A black box is a term used to describe a system or device whose internal workings are unknown or not understood. It is often used to refer to a…

Peter Jones

Software Factory

Software Factory Software Factory is a term used to describe a software development process that is based on the principles of industrial engineering. It is an approach to software development…

Peter Jones

Game Engine

Game Engine A game engine is a software development environment designed to create video games. It provides a set of tools and libraries that allow developers to create games for…

Peter Jones

Distributed Internet of Things (DIOT)

Distributed Internet of Things (DIOT) DIOT stands for Distributed Internet of Things. It is a type of network architecture that enables the connection of multiple devices, such as sensors, actuators,…

Peter Jones

Embedded System

Embedded System An embedded system is a computer system designed to perform a specific task or set of tasks within a larger system. It is typically embedded as part of…

Peter Jones

Real-Time Operating System (RTOS)

Real-Time Operating System (RTOS) Real-Time Operating System (RTOS) is a type of operating system that is designed to provide deterministic, real-time performance. It is used in embedded systems, such as…

Peter Jones

Sidecar

Sidecar A sidecar is a software component that provides additional functionality to an existing application or system. It is typically used to extend the capabilities of an existing system without…

Peter Jones

Software Rig

Software Rig Software rig is a term used to describe the process of creating a software system that is designed to be as efficient and reliable as possible. It involves…

Peter Jones

Rig

Rig Rig is a term used in the IT industry to refer to a set of hardware and software components that are used together to create a computer system. It…

Peter Jones

Application Programming Interface (API)

Application Programming Interface (API) API stands for Application Programming Interface. It is a set of routines, protocols, and tools for building software applications. An API specifies how software components should…

Peter Jones

Asynchronous JavaScript and XML (AJAX)

Asynchronous JavaScript and XML (AJAX) AJAX stands for Asynchronous JavaScript and XML. It is a web development technique used to create interactive web applications. AJAX combines HTML, CSS, JavaScript, and…

Peter Jones

Dotnet

Dotnet DotNet is a software framework developed by Microsoft that provides a platform for developers to create applications and services. It is based on the .NET Framework, which is a…

Peter Jones

HyperText Markup Language (HTML)

HyperText Markup Language (HTML) HTML stands for HyperText Markup Language. It is a markup language used to create web pages and other documents that can be viewed in a web…

Peter Jones

Cascading Style Sheets

Cascading Style Sheets Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language such as HTML. CSS is…

Peter Jones

Javascript

Javascript Javascript is a scripting language that is used to create interactive web pages and applications. It is a high-level, interpreted programming language that is used to add dynamic content…

Peter Jones

Ruby

Ruby Ruby is a dynamic, open source programming language with a focus on simplicity and productivity. It has an elegant syntax that is natural to read and easy to write….

Peter Jones

Haskell

Haskell Haskell is a general-purpose, purely functional programming language with non-strict semantics and strong static typing. It is named after the logician Haskell Curry. Haskell is widely used in academia…

Peter Jones

Lean Six Sigma

Lean Six Sigma Lean Six Sigma is a business management strategy that combines two powerful process improvement methods: Lean and Six Sigma. Lean is a methodology that focuses on eliminating…

Peter Jones

Six Sigma

Six Sigma Six Sigma is a business management strategy that was developed by Motorola in 1986. It is a set of techniques and tools for process improvement that are used…

Peter Jones

Capability Maturity Model (CMM)

Capability Maturity Model (CMM) The Capability Maturity Model (CMM) is a framework developed by the Software Engineering Institute (SEI) at Carnegie Mellon University to help organizations assess and improve their…

Peter Jones

Incident Management

Incident Management Incident Management is a process used to manage and respond to unexpected events or incidents that occur within an organization’s IT infrastructure. It is a critical component of…

Peter Jones

Request Fulfillment

Request Fulfillment Request fulfillment is the process of responding to and completing customer requests. It is a critical component of customer service and involves the coordination of resources, processes, and…

Peter Jones

IT Storefront

IT Storefront An IT Storefront is a web-based platform that provides an online marketplace for businesses to purchase and manage their IT products and services. It is a centralized hub…

Peter Jones

IT Ecosystem

IT Ecosystem An IT ecosystem is a complex network of interdependent components that work together to create an environment in which information technology (IT) can be used to its fullest…

Peter Jones

PANDOC

PANDOC PANDOC is a free and open-source document converter, written in Haskell. It can convert documents from one markup format into another, including HTML, LaTeX, PDF, EPUB, and many others….

Peter Jones

EPUB (Electronic Publication)

EPUB (Electronic Publication) EPUB (Electronic Publication) is a free and open e-book standard by the International Digital Publishing Forum (IDPF). It is designed for reflowable content, meaning that the text…

Peter Jones

Open Document Format (ODF)

Open Document Format (ODF) Open Document Format (ODF) is an open, XML-based file format for office documents, such as text documents, spreadsheets, presentations, drawings and databases. It was developed by…

Peter Jones

Portable Document Format (PDF)

Portable Document Format (PDF) PDF (Portable Document Format) is a file format developed by Adobe Systems in 1993 for document exchange. It is now an open standard maintained by the…

Peter Jones

LaTeX

LaTeX LaTeX is a typesetting system used for creating documents that are both aesthetically pleasing and mathematically precise. It is a powerful tool for producing professional-looking documents, and it is…

Peter Jones

Markdown (MD)

Markdown (MD) Markdown is a lightweight markup language that is used to format text and create documents. It was created in 2004 by John Gruber and Aaron Swartz as a…

Peter Jones

eXtensible Markup Language (XML)

eXtensible Markup Language (XML) XML (eXtensible Markup Language) is a markup language that is used to store and transport data. It was designed to be both human-readable and machine-readable, and…

Peter Jones

Multi-factor authentication (MFA)

Multi-factor authentication (MFA) Multi-factor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a…

Peter Jones

YAML

YAML YAML (YAML Ain’t Markup Language) is a human-readable data serialization language. It is commonly used for configuration files, but could be used in many applications where data is being…

Peter Jones

git

git Git is a distributed version control system (DVCS) that is used to track changes in computer files and coordinate work on those files among multiple people. It is primarily…

Peter Jones

Distributed Version Control System

Distributed Version Control System A distributed version control system (DVCS) is a type of version control system that allows multiple users to collaborate on a project by sharing and tracking…

Peter Jones

DevSecOps

DevSecOps DevSecOps is a term used to describe the integration of security into the development and operations processes of an organization. It is a combination of DevOps and Security, and…

Peter Jones

Systems Development Life Cycle

Systems Development Life Cycle (SDLC) Systems Development Life Cycle (SDLC) is a process used by organizations to develop and maintain information systems. It is a framework that defines the steps…

Peter Jones

IT Automation

IT Automation IT automation is the use of technology to automate tasks that would otherwise be done manually. It is a process that involves the use of software, hardware, and…

Peter Jones

Provisioning

Provisioning Provisioning is the process of preparing and equipping a network to allow it to provide services to its users. It involves configuring hardware and software components, allocating resources, and…

Peter Jones

Orchestration

Orchestration Orchestration is a term used to describe the process of automating the coordination and management of complex IT systems. It is a way of managing multiple components, such as…

Peter Jones

Connection Broker

Connection Broker A connection broker is a software program that facilitates the connection between two or more computer systems, networks, or applications. It acts as an intermediary between the two…

Peter Jones

Virtual Desktop Infrastructure (VDI)

Virtual Desktop Infrastructure (VDI) Virtual Desktop Infrastructure (VDI) is a technology that enables organizations to provide their employees with secure, remote access to their desktop environment. VDI is a form…

Peter Jones

Commercial Off-The-Shelf

Commercial Off-The-Shelf COTS, or Commercial Off-The-Shelf software, is a type of software that is pre-packaged and ready for purchase and use. It is typically developed by a third-party vendor and…

Peter Jones

Graphics (GFX)

Graphics (GFX) GFX, or Graphics, is a term used to describe the visual elements of a computer system. It encompasses the use of images, text, and other visual elements to…

Peter Jones

Fixed Validated Encryption (FVE)

Fixed Validated Encryption (FVE) Fixed Validated Encryption (FVE) is a type of encryption technology that provides a secure way to store and transmit data. It is designed to protect data…

Peter Jones

Hyper Converged Infrastructure (HCI)

Hyper Converged Infrastructure Hyper Converged Infrastructure (HCI) is a type of IT infrastructure that combines compute, storage, and networking into a single system. It is designed to simplify the deployment…

Peter Jones

Microsegmentation

Microsegmentation Microsegmentation is a security strategy that divides a network into smaller segments, or microsegments, in order to reduce the attack surface and improve security. It is a form of…

Peter Jones

NAC

NAC Network Access Control (NAC) is a security technology that enables organizations to control and monitor the access of users, devices, and applications to their networks. NAC is used to…

Peter Jones

ZeroTrust

ZeroTrust ZeroTrust is a security concept that assumes that all users, devices, and networks are untrusted by default. It is based on the idea that organizations should not trust any…

Peter Jones

Containerisation

Containerisation Containerisation is a technology that enables the packaging of an application and its dependencies into a single, self-contained unit. This unit, known as a container, can then be deployed…

Peter Jones

Concept of Operations (ConOps)

Concept of Operations (ConOps) ConOps, short for Concept of Operations, is a document that outlines the operational concept for a system or project. It is used to define the system’s…

Peter Jones

Systems Operations (SysOps)

Systems Operations (SysOps) Systems Operations (SysOps) is a term used to describe the activities and processes involved in the management, maintenance, and operation of computer systems. It is a broad…

Peter Jones

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) An Acceptable Use Policy (AUP) is a set of rules and guidelines that define the acceptable use of an organization’s information technology (IT) resources. It is…

Peter Jones

Internet Protocol Security (IPsec)

Internet Protocol Security (IPsec) IPsec (Internet Protocol Security) is a suite of protocols used to secure communications over the Internet. It is a set of security protocols that provide authentication,…

Peter Jones

Virtual Private Network (VPN)

Virtual Private Network (VPN) A Virtual Private Network (VPN) is a technology that allows users to securely connect to a private network over the internet. It provides a secure connection…

Peter Jones

Network Load Balancing

Network Load Balancing (NLB) Network Load Balancing (NLB) is a technology that enables multiple computers to work together as a single system to provide high availability and scalability for network…

Peter Jones

Transport Layer Security

Transport Layer Security (TLS) Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication over the Internet. It is the most widely used security protocol today and is…

Peter Jones

End to End Encryption

End to End Encryption End-to-end encryption (E2EE) is a type of data encryption that ensures only the sender and the intended recipient can access the data. It is a form…

Peter Jones

Message Queue

Message Queue A message queue is a type of software system that enables the exchange of messages between two or more applications. It is a form of asynchronous communication, meaning…

Peter Jones

Simple Mail Transfer Protocol (SMTP)

Simple Mail Transfer Protocol (SMTP) Simple Mail Transfer Protocol (SMTP) is a protocol used for sending and receiving emails over the Internet. It is the most widely used protocol for…

Peter Jones

Voice over Internet Protocol (VoIP)

Voice over Internet Protocol (VoIP) Voice over Internet Protocol (VoIP) is a technology that enables users to make telephone calls over the Internet. It is a form of communication that…

Peter Jones

Data Loss Prevention (DLP)

Data Loss Prevention (DLP) Data Loss Prevention (DLP) is a security technology that helps organizations protect their sensitive data from unauthorized access, use, or disclosure. It is a set of…

Peter Jones

Archive & Retrieval

Archive & Retrieval Archive and Retrieval is a term used to describe the process of storing and retrieving data from a computer system. It is an important part of any…

Peter Jones

Backup & Recovery

Backup & Recovery Backup and recovery is a process of creating copies of data and applications in order to protect them from loss or damage. It is an important part…

Peter Jones

Endpoint Security

Endpoint Security Endpoint security is a type of cybersecurity that focuses on protecting the endpoints of a network, such as computers, laptops, tablets, and smartphones. It is designed to protect…

Peter Jones

Mobile Computing

Mobile Computing Mobile computing is a term used to describe the use of technology that allows users to access information and services from any location, at any time, using a…

Peter Jones

Linux

Linux Linux is an open source operating system that was first released in 1991 by Linus Torvalds. It is a Unix-like operating system that is based on the Linux kernel,…

Peter Jones

UNIX

UNIX UNIX is a multi-user, multitasking operating system developed in the late 1960s by AT&T Bell Laboratories. It is a powerful, versatile, and reliable operating system that is used in…

Peter Jones

Domain

Domain A domain is a set of network resources that are managed and maintained by a single organization or individual. It is a logical grouping of computers, users, and other…

Peter Jones

Kerberos

Kerberos Kerberos is an authentication protocol that provides secure communication over a network. It is used to authenticate users and services on a network, and it is designed to prevent…

Peter Jones

Active Directory

Active Directory Active Directory is a directory service created by Microsoft for use in a Windows Server environment. It is included in most Windows Server operating systems as a set…

Peter Jones

LDAP

Lightweight Directory Access Protocol (LDAP) LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage information stored in a directory service. It is an open, vendor-neutral, industry…

Peter Jones

Directory Service

Directory Service Directory Service is a type of software that provides a centralized, organized way to store and manage information about users, computers, networks, and other resources in an organization….

Peter Jones

Dynamic Domain Name System

Dynamic Domain Name System (DDI) Dynamic Domain Name System (DDI) is a technology that allows for the dynamic assignment of domain names to IP addresses. It is an extension of…

Peter Jones

IP Address Management (IPAM)

IP Address Management IP Address Management (IPAM) is the process of managing and tracking the use of Internet Protocol (IP) address space in a computer network. It involves tracking which…

Peter Jones

DNS

DNS Domain Name System (DNS) is a distributed database system that translates domain names into numerical Internet Protocol (IP) addresses. DNS is used to locate computers and other resources connected…

Peter Jones

DHCP

DHCP Dynamic Host Configuration Protocol (DHCP) is a network protocol used to automatically assign IP addresses to devices on a network. It is used to provide an efficient way of…

Peter Jones

Identity and Access Management (IdAM)

Identity and Access Management (IdAM) IdAM (Identity and Access Management) is a set of processes, technologies, and policies that are used to manage digital identities and access to resources. It…

Peter Jones

Turnkey

Turnkey Turnkey is a term used to describe a product or service that is ready to use immediately after purchase or installation. It is often used in the context of…

Peter Jones

Systems Requirements Definition (SRD)

Systems Requirements Definition (SRD) Systems Requirements Definition (SRD) is a document that outlines the requirements for a system or product. It is used to define the scope of a project,…

Peter Jones

Cyber Security

Cyber Security Cyber security is the practice of protecting networks, systems, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money…

Peter Jones

Information Management and Technology (IM&T)

Information Management and Technology (IM&T) IM&T stands for Information Management and Technology, and is a term used to describe the use of technology to manage information. It is a broad…

Peter Jones

Information and Communications Technology (ICT)

Information and Communications Technology (ICT) ICT stands for Information and Communications Technology. It is a broad term that encompasses any technology used to store, retrieve, transmit, and manipulate data or…

Peter Jones

Information Technology (IT)

Information Technology (IT) Information Technology (IT) is a broad term that encompasses all aspects of managing and processing information, including the use of computers, networks, software, and other technologies. IT…

Peter Jones

Digital (Business)

Digital (Business) Digital is a term used to describe the use of technology to create, store, process, and communicate information. It is a broad term that encompasses many different types…

Peter Jones

Digital

Digital Digital is a term used to describe any technology that uses digital signals or data for its operation. Digital technology is based on the use of binary code, which…

Peter Jones

Database

Database A database is a structured collection of data that is stored in a computer system. It is organized in such a way that it can be easily accessed, managed,…

Peter Jones

Middleware

Middleware Middleware is a type of software that acts as a bridge between two or more applications, databases, or systems. It is used to facilitate communication and data exchange between…

Peter Jones

Business Application

Business Application Business applications are software programs that are designed to help businesses automate and streamline their operations. They are used to manage data, automate processes, and provide insights into…

Peter Jones

Application

Application An application, or “app”, is a computer program designed to help users perform specific tasks. Applications are typically designed to run on a specific operating system, such as Windows,…

Peter Jones

Software

Software Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It can be divided into two main categories: system software and application…

Peter Jones

Virtualisation

Virtualisation Virtualisation is a technology that allows a single physical computer to be divided into multiple virtual machines, each of which can run its own operating system and applications. It…

Peter Jones

Hypervisor

Hypervisor A hypervisor is a type of software that allows multiple operating systems to run on the same physical hardware. It is also known as a virtual machine monitor (VMM)…

Peter Jones

Storage

Storage Storage is the process of keeping data in a secure and organized manner for future use. It is an essential part of any information technology system, as it allows…

Peter Jones

Hardware

Hardware Hardware is a term used to describe the physical components of a computer system. It includes the internal components such as the motherboard, processor, memory, hard drive, and other…

Peter Jones

Browser

Browser A browser is a software application used to access the World Wide Web and other Internet services. It is the most common way for users to view and interact…

Peter Jones

Core

Core The term “core” is used in many different contexts within the IT industry. Generally, it refers to the most important or essential components of a system, such as hardware,…

Peter Jones

Edge

Edge Edge is a term used to describe the outermost layer of a network, which is typically composed of endpoints such as computers, mobile devices, and other connected devices. It…

Peter Jones

SaaS

Software as a Service Software as a Service (SaaS) is a software delivery model in which software and associated data are centrally hosted on the cloud. SaaS is typically accessed…

Peter Jones