Service Desk
Service Desk Servicedesk is a term used to describe a centralized point of contact for IT services and support. It is a customer service-oriented system that provides users with a…
Service Desk Servicedesk is a term used to describe a centralized point of contact for IT services and support. It is a customer service-oriented system that provides users with a…
Blackbox A black box is a term used to describe a system or device whose internal workings are unknown or not understood. It is often used to refer to a…
Software Factory Software Factory is a term used to describe a software development process that is based on the principles of industrial engineering. It is an approach to software development…
Game Engine A game engine is a software development environment designed to create video games. It provides a set of tools and libraries that allow developers to create games for…
Distributed Internet of Things (DIOT) DIOT stands for Distributed Internet of Things. It is a type of network architecture that enables the connection of multiple devices, such as sensors, actuators,…
Embedded System An embedded system is a computer system designed to perform a specific task or set of tasks within a larger system. It is typically embedded as part of…
Real-Time Operating System (RTOS) Real-Time Operating System (RTOS) is a type of operating system that is designed to provide deterministic, real-time performance. It is used in embedded systems, such as…
Sidecar A sidecar is a software component that provides additional functionality to an existing application or system. It is typically used to extend the capabilities of an existing system without…
Software Rig Software rig is a term used to describe the process of creating a software system that is designed to be as efficient and reliable as possible. It involves…
Rig Rig is a term used in the IT industry to refer to a set of hardware and software components that are used together to create a computer system. It…
Application Programming Interface (API) API stands for Application Programming Interface. It is a set of routines, protocols, and tools for building software applications. An API specifies how software components should…
Asynchronous JavaScript and XML (AJAX) AJAX stands for Asynchronous JavaScript and XML. It is a web development technique used to create interactive web applications. AJAX combines HTML, CSS, JavaScript, and…
Dotnet DotNet is a software framework developed by Microsoft that provides a platform for developers to create applications and services. It is based on the .NET Framework, which is a…
HyperText Markup Language (HTML) HTML stands for HyperText Markup Language. It is a markup language used to create web pages and other documents that can be viewed in a web…
Cascading Style Sheets Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language such as HTML. CSS is…
Javascript Javascript is a scripting language that is used to create interactive web pages and applications. It is a high-level, interpreted programming language that is used to add dynamic content…
Ruby Ruby is a dynamic, open source programming language with a focus on simplicity and productivity. It has an elegant syntax that is natural to read and easy to write….
Haskell Haskell is a general-purpose, purely functional programming language with non-strict semantics and strong static typing. It is named after the logician Haskell Curry. Haskell is widely used in academia…
Lean Six Sigma Lean Six Sigma is a business management strategy that combines two powerful process improvement methods: Lean and Six Sigma. Lean is a methodology that focuses on eliminating…
Six Sigma Six Sigma is a business management strategy that was developed by Motorola in 1986. It is a set of techniques and tools for process improvement that are used…
Capability Maturity Model (CMM) The Capability Maturity Model (CMM) is a framework developed by the Software Engineering Institute (SEI) at Carnegie Mellon University to help organizations assess and improve their…
Incident Management Incident Management is a process used to manage and respond to unexpected events or incidents that occur within an organization’s IT infrastructure. It is a critical component of…
Request Fulfillment Request fulfillment is the process of responding to and completing customer requests. It is a critical component of customer service and involves the coordination of resources, processes, and…
IT Storefront An IT Storefront is a web-based platform that provides an online marketplace for businesses to purchase and manage their IT products and services. It is a centralized hub…
IT Ecosystem An IT ecosystem is a complex network of interdependent components that work together to create an environment in which information technology (IT) can be used to its fullest…
PANDOC PANDOC is a free and open-source document converter, written in Haskell. It can convert documents from one markup format into another, including HTML, LaTeX, PDF, EPUB, and many others….
EPUB (Electronic Publication) EPUB (Electronic Publication) is a free and open e-book standard by the International Digital Publishing Forum (IDPF). It is designed for reflowable content, meaning that the text…
Open Document Format (ODF) Open Document Format (ODF) is an open, XML-based file format for office documents, such as text documents, spreadsheets, presentations, drawings and databases. It was developed by…
Portable Document Format (PDF) PDF (Portable Document Format) is a file format developed by Adobe Systems in 1993 for document exchange. It is now an open standard maintained by the…
LaTeX LaTeX is a typesetting system used for creating documents that are both aesthetically pleasing and mathematically precise. It is a powerful tool for producing professional-looking documents, and it is…
Markdown (MD) Markdown is a lightweight markup language that is used to format text and create documents. It was created in 2004 by John Gruber and Aaron Swartz as a…
eXtensible Markup Language (XML) XML (eXtensible Markup Language) is a markup language that is used to store and transport data. It was designed to be both human-readable and machine-readable, and…
Multi-factor authentication (MFA) Multi-factor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a…
YAML YAML (YAML Ain’t Markup Language) is a human-readable data serialization language. It is commonly used for configuration files, but could be used in many applications where data is being…
git Git is a distributed version control system (DVCS) that is used to track changes in computer files and coordinate work on those files among multiple people. It is primarily…
Distributed Version Control System A distributed version control system (DVCS) is a type of version control system that allows multiple users to collaborate on a project by sharing and tracking…
DevSecOps DevSecOps is a term used to describe the integration of security into the development and operations processes of an organization. It is a combination of DevOps and Security, and…
Systems Development Life Cycle (SDLC) Systems Development Life Cycle (SDLC) is a process used by organizations to develop and maintain information systems. It is a framework that defines the steps…
IT Automation IT automation is the use of technology to automate tasks that would otherwise be done manually. It is a process that involves the use of software, hardware, and…
Provisioning Provisioning is the process of preparing and equipping a network to allow it to provide services to its users. It involves configuring hardware and software components, allocating resources, and…
Orchestration Orchestration is a term used to describe the process of automating the coordination and management of complex IT systems. It is a way of managing multiple components, such as…
Connection Broker A connection broker is a software program that facilitates the connection between two or more computer systems, networks, or applications. It acts as an intermediary between the two…
Virtual Desktop Infrastructure (VDI) Virtual Desktop Infrastructure (VDI) is a technology that enables organizations to provide their employees with secure, remote access to their desktop environment. VDI is a form…
Commercial Off-The-Shelf COTS, or Commercial Off-The-Shelf software, is a type of software that is pre-packaged and ready for purchase and use. It is typically developed by a third-party vendor and…
Graphics (GFX) GFX, or Graphics, is a term used to describe the visual elements of a computer system. It encompasses the use of images, text, and other visual elements to…
Fixed Validated Encryption (FVE) Fixed Validated Encryption (FVE) is a type of encryption technology that provides a secure way to store and transmit data. It is designed to protect data…
Hyper Converged Infrastructure Hyper Converged Infrastructure (HCI) is a type of IT infrastructure that combines compute, storage, and networking into a single system. It is designed to simplify the deployment…
Microsegmentation Microsegmentation is a security strategy that divides a network into smaller segments, or microsegments, in order to reduce the attack surface and improve security. It is a form of…
NAC Network Access Control (NAC) is a security technology that enables organizations to control and monitor the access of users, devices, and applications to their networks. NAC is used to…
ZeroTrust ZeroTrust is a security concept that assumes that all users, devices, and networks are untrusted by default. It is based on the idea that organizations should not trust any…
Containerisation Containerisation is a technology that enables the packaging of an application and its dependencies into a single, self-contained unit. This unit, known as a container, can then be deployed…
Concept of Operations (ConOps) ConOps, short for Concept of Operations, is a document that outlines the operational concept for a system or project. It is used to define the system’s…
Systems Operations (SysOps) Systems Operations (SysOps) is a term used to describe the activities and processes involved in the management, maintenance, and operation of computer systems. It is a broad…
Acceptable Use Policy (AUP) An Acceptable Use Policy (AUP) is a set of rules and guidelines that define the acceptable use of an organization’s information technology (IT) resources. It is…
Internet Protocol Security (IPsec) IPsec (Internet Protocol Security) is a suite of protocols used to secure communications over the Internet. It is a set of security protocols that provide authentication,…
Virtual Private Network (VPN) A Virtual Private Network (VPN) is a technology that allows users to securely connect to a private network over the internet. It provides a secure connection…
Network Load Balancing (NLB) Network Load Balancing (NLB) is a technology that enables multiple computers to work together as a single system to provide high availability and scalability for network…
Transport Layer Security (TLS) Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication over the Internet. It is the most widely used security protocol today and is…
End to End Encryption End-to-end encryption (E2EE) is a type of data encryption that ensures only the sender and the intended recipient can access the data. It is a form…
Message Queue A message queue is a type of software system that enables the exchange of messages between two or more applications. It is a form of asynchronous communication, meaning…
Simple Mail Transfer Protocol (SMTP) Simple Mail Transfer Protocol (SMTP) is a protocol used for sending and receiving emails over the Internet. It is the most widely used protocol for…
Voice over Internet Protocol (VoIP) Voice over Internet Protocol (VoIP) is a technology that enables users to make telephone calls over the Internet. It is a form of communication that…
Data Loss Prevention (DLP) Data Loss Prevention (DLP) is a security technology that helps organizations protect their sensitive data from unauthorized access, use, or disclosure. It is a set of…
Archive & Retrieval Archive and Retrieval is a term used to describe the process of storing and retrieving data from a computer system. It is an important part of any…
Backup & Recovery Backup and recovery is a process of creating copies of data and applications in order to protect them from loss or damage. It is an important part…
Endpoint Security Endpoint security is a type of cybersecurity that focuses on protecting the endpoints of a network, such as computers, laptops, tablets, and smartphones. It is designed to protect…
Mobile Computing Mobile computing is a term used to describe the use of technology that allows users to access information and services from any location, at any time, using a…
Linux Linux is an open source operating system that was first released in 1991 by Linus Torvalds. It is a Unix-like operating system that is based on the Linux kernel,…
UNIX UNIX is a multi-user, multitasking operating system developed in the late 1960s by AT&T Bell Laboratories. It is a powerful, versatile, and reliable operating system that is used in…
Domain A domain is a set of network resources that are managed and maintained by a single organization or individual. It is a logical grouping of computers, users, and other…
Kerberos Kerberos is an authentication protocol that provides secure communication over a network. It is used to authenticate users and services on a network, and it is designed to prevent…
Active Directory Active Directory is a directory service created by Microsoft for use in a Windows Server environment. It is included in most Windows Server operating systems as a set…
Lightweight Directory Access Protocol (LDAP) LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage information stored in a directory service. It is an open, vendor-neutral, industry…
Directory Service Directory Service is a type of software that provides a centralized, organized way to store and manage information about users, computers, networks, and other resources in an organization….
Dynamic Domain Name System (DDI) Dynamic Domain Name System (DDI) is a technology that allows for the dynamic assignment of domain names to IP addresses. It is an extension of…
IP Address Management IP Address Management (IPAM) is the process of managing and tracking the use of Internet Protocol (IP) address space in a computer network. It involves tracking which…
DNS Domain Name System (DNS) is a distributed database system that translates domain names into numerical Internet Protocol (IP) addresses. DNS is used to locate computers and other resources connected…
DHCP Dynamic Host Configuration Protocol (DHCP) is a network protocol used to automatically assign IP addresses to devices on a network. It is used to provide an efficient way of…
Identity and Access Management (IdAM) IdAM (Identity and Access Management) is a set of processes, technologies, and policies that are used to manage digital identities and access to resources. It…
Turnkey Turnkey is a term used to describe a product or service that is ready to use immediately after purchase or installation. It is often used in the context of…
Systems Requirements Definition (SRD) Systems Requirements Definition (SRD) is a document that outlines the requirements for a system or product. It is used to define the scope of a project,…
Cyber Security Cyber security is the practice of protecting networks, systems, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money…
Information Management and Technology (IM&T) IM&T stands for Information Management and Technology, and is a term used to describe the use of technology to manage information. It is a broad…
Information and Communications Technology (ICT) ICT stands for Information and Communications Technology. It is a broad term that encompasses any technology used to store, retrieve, transmit, and manipulate data or…
Information Technology (IT) Information Technology (IT) is a broad term that encompasses all aspects of managing and processing information, including the use of computers, networks, software, and other technologies. IT…
Digital (Business) Digital is a term used to describe the use of technology to create, store, process, and communicate information. It is a broad term that encompasses many different types…
Digital Digital is a term used to describe any technology that uses digital signals or data for its operation. Digital technology is based on the use of binary code, which…
Database A database is a structured collection of data that is stored in a computer system. It is organized in such a way that it can be easily accessed, managed,…
Middleware Middleware is a type of software that acts as a bridge between two or more applications, databases, or systems. It is used to facilitate communication and data exchange between…
Business Application Business applications are software programs that are designed to help businesses automate and streamline their operations. They are used to manage data, automate processes, and provide insights into…
Application An application, or “app”, is a computer program designed to help users perform specific tasks. Applications are typically designed to run on a specific operating system, such as Windows,…
Software Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It can be divided into two main categories: system software and application…
Virtualisation Virtualisation is a technology that allows a single physical computer to be divided into multiple virtual machines, each of which can run its own operating system and applications. It…
Hypervisor A hypervisor is a type of software that allows multiple operating systems to run on the same physical hardware. It is also known as a virtual machine monitor (VMM)…
Storage Storage is the process of keeping data in a secure and organized manner for future use. It is an essential part of any information technology system, as it allows…
Hardware Hardware is a term used to describe the physical components of a computer system. It includes the internal components such as the motherboard, processor, memory, hard drive, and other…
Browser A browser is a software application used to access the World Wide Web and other Internet services. It is the most common way for users to view and interact…
Core The term “core” is used in many different contexts within the IT industry. Generally, it refers to the most important or essential components of a system, such as hardware,…
Edge Edge is a term used to describe the outermost layer of a network, which is typically composed of endpoints such as computers, mobile devices, and other connected devices. It…
Software as a Service Software as a Service (SaaS) is a software delivery model in which software and associated data are centrally hosted on the cloud. SaaS is typically accessed…