Reich

Wilhelm Reich’s work was controversial during his lifetime.

Amanda Girard

Mars

What to Read about the Red ?

Amanda Girard

Neon Genesis Evangelion

Neon Genesis Evangelion is known for exploring complex and multi-layered themes.

Amanda Girard

S1000D

S1000D S1000D is an international technical specification for the development and delivery of technical publications for the aerospace, defense, and other industries. It is a standard for the exchange of…

Amanda Girard

Simplified Technical English (STE)

Simplified Technical English (STE) Simplified Technical English (STE) is a controlled language developed by the aerospace industry to improve the readability and understandability of technical documentation. It is a subset…

Amanda Girard

Technical English

Technical English Technical English is a type of English language used in specialized fields such as engineering, science, medicine, and technology. It is characterized by its use of specialized vocabulary,…

Amanda Girard

Service Desk

Service Desk Servicedesk is a term used to describe a centralized point of contact for IT services and support. It is a customer service-oriented system that provides users with a…

Amanda Girard

Blackbox

Blackbox A black box is a term used to describe a system or device whose internal workings are unknown or not understood. It is often used to refer to a…

Amanda Girard

Software Factory

Software Factory Software Factory is a term used to describe a software development process that is based on the principles of industrial engineering. It is an approach to software development…

Amanda Girard

Game Engine

Game Engine A game engine is a software development environment designed to create video games. It provides a set of tools and libraries that allow developers to create games for…

Amanda Girard

Distributed Internet of Things (DIOT)

Distributed Internet of Things (DIOT) DIOT stands for Distributed Internet of Things. It is a type of network architecture that enables the connection of multiple devices, such as sensors, actuators,…

Amanda Girard

Embedded System

Embedded System An embedded system is a computer system designed to perform a specific task or set of tasks within a larger system. It is typically embedded as part of…

Amanda Girard

Real-Time Operating System (RTOS)

Real-Time Operating System (RTOS) Real-Time Operating System (RTOS) is a type of operating system that is designed to provide deterministic, real-time performance. It is used in embedded systems, such as…

Amanda Girard

Sidecar

Sidecar A sidecar is a software component that provides additional functionality to an existing application or system. It is typically used to extend the capabilities of an existing system without…

Amanda Girard

Software Rig

Software Rig Software rig is a term used to describe the process of creating a software system that is designed to be as efficient and reliable as possible. It involves…

Amanda Girard

Rig

Rig Rig is a term used in the IT industry to refer to a set of hardware and software components that are used together to create a computer system. It…

Amanda Girard

Application Programming Interface (API)

Application Programming Interface (API) API stands for Application Programming Interface. It is a set of routines, protocols, and tools for building software applications. An API specifies how software components should…

Amanda Girard

Asynchronous JavaScript and XML (AJAX)

Asynchronous JavaScript and XML (AJAX) AJAX stands for Asynchronous JavaScript and XML. It is a web development technique used to create interactive web applications. AJAX combines HTML, CSS, JavaScript, and…

Amanda Girard

Dotnet

Dotnet DotNet is a software framework developed by Microsoft that provides a platform for developers to create applications and services. It is based on the .NET Framework, which is a…

Amanda Girard

HyperText Markup Language (HTML)

HyperText Markup Language (HTML) HTML stands for HyperText Markup Language. It is a markup language used to create web pages and other documents that can be viewed in a web…

Amanda Girard

Cascading Style Sheets

Cascading Style Sheets Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language such as HTML. CSS is…

Amanda Girard

Javascript

Javascript Javascript is a scripting language that is used to create interactive web pages and applications. It is a high-level, interpreted programming language that is used to add dynamic content…

Amanda Girard

Ruby

Ruby Ruby is a dynamic, open source programming language with a focus on simplicity and productivity. It has an elegant syntax that is natural to read and easy to write….

Amanda Girard

Haskell

Haskell Haskell is a general-purpose, purely functional programming language with non-strict semantics and strong static typing. It is named after the logician Haskell Curry. Haskell is widely used in academia…

Amanda Girard

Lean Six Sigma

Lean Six Sigma Lean Six Sigma is a business management strategy that combines two powerful process improvement methods: Lean and Six Sigma. Lean is a methodology that focuses on eliminating…

Amanda Girard

Six Sigma

Six Sigma Six Sigma is a business management strategy that was developed by Motorola in 1986. It is a set of techniques and tools for process improvement that are used…

Amanda Girard

Capability Maturity Model (CMM)

Capability Maturity Model (CMM) The Capability Maturity Model (CMM) is a framework developed by the Software Engineering Institute (SEI) at Carnegie Mellon University to help organizations assess and improve their…

Amanda Girard

Incident Management

Incident Management Incident Management is a process used to manage and respond to unexpected events or incidents that occur within an organization’s IT infrastructure. It is a critical component of…

Amanda Girard

Request Fulfillment

Request Fulfillment Request fulfillment is the process of responding to and completing customer requests. It is a critical component of customer service and involves the coordination of resources, processes, and…

Amanda Girard

IT Storefront

IT Storefront An IT Storefront is a web-based platform that provides an online marketplace for businesses to purchase and manage their IT products and services. It is a centralized hub…

Amanda Girard

IT Ecosystem

IT Ecosystem An IT ecosystem is a complex network of interdependent components that work together to create an environment in which information technology (IT) can be used to its fullest…

Amanda Girard

PANDOC

PANDOC PANDOC is a free and open-source document converter, written in Haskell. It can convert documents from one markup format into another, including HTML, LaTeX, PDF, EPUB, and many others….

Amanda Girard

EPUB (Electronic Publication)

EPUB (Electronic Publication) EPUB (Electronic Publication) is a free and open e-book standard by the International Digital Publishing Forum (IDPF). It is designed for reflowable content, meaning that the text…

Amanda Girard

Open Document Format (ODF)

Open Document Format (ODF) Open Document Format (ODF) is an open, XML-based file format for office documents, such as text documents, spreadsheets, presentations, drawings and databases. It was developed by…

Amanda Girard

Portable Document Format (PDF)

Portable Document Format (PDF) PDF (Portable Document Format) is a file format developed by Adobe Systems in 1993 for document exchange. It is now an open standard maintained by the…

Amanda Girard

LaTeX

LaTeX LaTeX is a typesetting system used for creating documents that are both aesthetically pleasing and mathematically precise. It is a powerful tool for producing professional-looking documents, and it is…

Amanda Girard

Markdown (MD)

Markdown (MD) Markdown is a lightweight markup language that is used to format text and create documents. It was created in 2004 by John Gruber and Aaron Swartz as a…

Amanda Girard

eXtensible Markup Language (XML)

eXtensible Markup Language (XML) XML (eXtensible Markup Language) is a markup language that is used to store and transport data. It was designed to be both human-readable and machine-readable, and…

Amanda Girard

Multi-factor authentication (MFA)

Multi-factor authentication (MFA) Multi-factor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a…

Amanda Girard

YAML

YAML YAML (YAML Ain’t Markup Language) is a human-readable data serialization language. It is commonly used for configuration files, but could be used in many applications where data is being…

Amanda Girard

git

git Git is a distributed version control system (DVCS) that is used to track changes in computer files and coordinate work on those files among multiple people. It is primarily…

Amanda Girard

Distributed Version Control System

Distributed Version Control System A distributed version control system (DVCS) is a type of version control system that allows multiple users to collaborate on a project by sharing and tracking…

Amanda Girard

DevSecOps

DevSecOps DevSecOps is a term used to describe the integration of security into the development and operations processes of an organization. It is a combination of DevOps and Security, and…

Amanda Girard

Systems Development Life Cycle

Systems Development Life Cycle (SDLC) Systems Development Life Cycle (SDLC) is a process used by organizations to develop and maintain information systems. It is a framework that defines the steps…

Amanda Girard

IT Automation

IT Automation IT automation is the use of technology to automate tasks that would otherwise be done manually. It is a process that involves the use of software, hardware, and…

Amanda Girard

Provisioning

Provisioning Provisioning is the process of preparing and equipping a network to allow it to provide services to its users. It involves configuring hardware and software components, allocating resources, and…

Amanda Girard

Orchestration

Orchestration Orchestration is a term used to describe the process of automating the coordination and management of complex IT systems. It is a way of managing multiple components, such as…

Amanda Girard

Connection Broker

Connection Broker A connection broker is a software program that facilitates the connection between two or more computer systems, networks, or applications. It acts as an intermediary between the two…

Amanda Girard

Virtual Desktop Infrastructure (VDI)

Virtual Desktop Infrastructure (VDI) Virtual Desktop Infrastructure (VDI) is a technology that enables organizations to provide their employees with secure, remote access to their desktop environment. VDI is a form…

Amanda Girard

Commercial Off-The-Shelf

Commercial Off-The-Shelf COTS, or Commercial Off-The-Shelf software, is a type of software that is pre-packaged and ready for purchase and use. It is typically developed by a third-party vendor and…

Amanda Girard

Graphics (GFX)

Graphics (GFX) GFX, or Graphics, is a term used to describe the visual elements of a computer system. It encompasses the use of images, text, and other visual elements to…

Amanda Girard

Fixed Validated Encryption (FVE)

Fixed Validated Encryption (FVE) Fixed Validated Encryption (FVE) is a type of encryption technology that provides a secure way to store and transmit data. It is designed to protect data…

Amanda Girard

Hyper Converged Infrastructure (HCI)

Hyper Converged Infrastructure Hyper Converged Infrastructure (HCI) is a type of IT infrastructure that combines compute, storage, and networking into a single system. It is designed to simplify the deployment…

Amanda Girard

Microsegmentation

Microsegmentation Microsegmentation is a security strategy that divides a network into smaller segments, or microsegments, in order to reduce the attack surface and improve security. It is a form of…

Amanda Girard

NAC

NAC Network Access Control (NAC) is a security technology that enables organizations to control and monitor the access of users, devices, and applications to their networks. NAC is used to…

Amanda Girard

ZeroTrust

ZeroTrust ZeroTrust is a security concept that assumes that all users, devices, and networks are untrusted by default. It is based on the idea that organizations should not trust any…

Amanda Girard

Containerisation

Containerisation Containerisation is a technology that enables the packaging of an application and its dependencies into a single, self-contained unit. This unit, known as a container, can then be deployed…

Amanda Girard

Concept of Operations (ConOps)

Concept of Operations (ConOps) ConOps, short for Concept of Operations, is a document that outlines the operational concept for a system or project. It is used to define the system’s…

Amanda Girard

Systems Operations (SysOps)

Systems Operations (SysOps) Systems Operations (SysOps) is a term used to describe the activities and processes involved in the management, maintenance, and operation of computer systems. It is a broad…

Amanda Girard

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) An Acceptable Use Policy (AUP) is a set of rules and guidelines that define the acceptable use of an organization’s information technology (IT) resources. It is…

Amanda Girard

Internet Protocol Security (IPsec)

Internet Protocol Security (IPsec) IPsec (Internet Protocol Security) is a suite of protocols used to secure communications over the Internet. It is a set of security protocols that provide authentication,…

Amanda Girard

Virtual Private Network (VPN)

Virtual Private Network (VPN) A Virtual Private Network (VPN) is a technology that allows users to securely connect to a private network over the internet. It provides a secure connection…

Amanda Girard

Network Load Balancing

Network Load Balancing (NLB) Network Load Balancing (NLB) is a technology that enables multiple computers to work together as a single system to provide high availability and scalability for network…

Amanda Girard

Transport Layer Security

Transport Layer Security (TLS) Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication over the Internet. It is the most widely used security protocol today and is…

Amanda Girard

End to End Encryption

End to End Encryption End-to-end encryption (E2EE) is a type of data encryption that ensures only the sender and the intended recipient can access the data. It is a form…

Amanda Girard

Message Queue

Message Queue A message queue is a type of software system that enables the exchange of messages between two or more applications. It is a form of asynchronous communication, meaning…

Amanda Girard

Simple Mail Transfer Protocol (SMTP)

Simple Mail Transfer Protocol (SMTP) Simple Mail Transfer Protocol (SMTP) is a protocol used for sending and receiving emails over the Internet. It is the most widely used protocol for…

Amanda Girard

Voice over Internet Protocol (VoIP)

Voice over Internet Protocol (VoIP) Voice over Internet Protocol (VoIP) is a technology that enables users to make telephone calls over the Internet. It is a form of communication that…

Amanda Girard

Data Loss Prevention (DLP)

Data Loss Prevention (DLP) Data Loss Prevention (DLP) is a security technology that helps organizations protect their sensitive data from unauthorized access, use, or disclosure. It is a set of…

Amanda Girard

Archive & Retrieval

Archive & Retrieval Archive and Retrieval is a term used to describe the process of storing and retrieving data from a computer system. It is an important part of any…

Amanda Girard

Backup & Recovery

Backup & Recovery Backup and recovery is a process of creating copies of data and applications in order to protect them from loss or damage. It is an important part…

Amanda Girard

Endpoint Security

Endpoint Security Endpoint security is a type of cybersecurity that focuses on protecting the endpoints of a network, such as computers, laptops, tablets, and smartphones. It is designed to protect…

Amanda Girard

Mobile Computing

Mobile Computing Mobile computing is a term used to describe the use of technology that allows users to access information and services from any location, at any time, using a…

Amanda Girard

Linux

Linux Linux is an open source operating system that was first released in 1991 by Linus Torvalds. It is a Unix-like operating system that is based on the Linux kernel,…

Amanda Girard

UNIX

UNIX UNIX is a multi-user, multitasking operating system developed in the late 1960s by AT&T Bell Laboratories. It is a powerful, versatile, and reliable operating system that is used in…

Amanda Girard

Domain

Domain A domain is a set of network resources that are managed and maintained by a single organization or individual. It is a logical grouping of computers, users, and other…

Amanda Girard

Kerberos

Kerberos Kerberos is an authentication protocol that provides secure communication over a network. It is used to authenticate users and services on a network, and it is designed to prevent…

Amanda Girard

Active Directory

Active Directory Active Directory is a directory service created by Microsoft for use in a Windows Server environment. It is included in most Windows Server operating systems as a set…

Amanda Girard

LDAP

Lightweight Directory Access Protocol (LDAP) LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage information stored in a directory service. It is an open, vendor-neutral, industry…

Amanda Girard

Directory Service

Directory Service Directory Service is a type of software that provides a centralized, organized way to store and manage information about users, computers, networks, and other resources in an organization….

Amanda Girard

Dynamic Domain Name System

Dynamic Domain Name System (DDI) Dynamic Domain Name System (DDI) is a technology that allows for the dynamic assignment of domain names to IP addresses. It is an extension of…

Amanda Girard

IP Address Management (IPAM)

IP Address Management IP Address Management (IPAM) is the process of managing and tracking the use of Internet Protocol (IP) address space in a computer network. It involves tracking which…

Amanda Girard

DNS

DNS Domain Name System (DNS) is a distributed database system that translates domain names into numerical Internet Protocol (IP) addresses. DNS is used to locate computers and other resources connected…

Amanda Girard

DHCP

DHCP Dynamic Host Configuration Protocol (DHCP) is a network protocol used to automatically assign IP addresses to devices on a network. It is used to provide an efficient way of…

Amanda Girard

Identity and Access Management (IdAM)

Identity and Access Management (IdAM) IdAM (Identity and Access Management) is a set of processes, technologies, and policies that are used to manage digital identities and access to resources. It…

Amanda Girard

Turnkey

Turnkey Turnkey is a term used to describe a product or service that is ready to use immediately after purchase or installation. It is often used in the context of…

Amanda Girard

Systems Requirements Definition (SRD)

Systems Requirements Definition (SRD) Systems Requirements Definition (SRD) is a document that outlines the requirements for a system or product. It is used to define the scope of a project,…

Amanda Girard

Cyber Security

Cyber Security Cyber security is the practice of protecting networks, systems, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money…

Amanda Girard

Information Management and Technology (IM&T)

Information Management and Technology (IM&T) IM&T stands for Information Management and Technology, and is a term used to describe the use of technology to manage information. It is a broad…

Amanda Girard

Information and Communications Technology (ICT)

Information and Communications Technology (ICT) ICT stands for Information and Communications Technology. It is a broad term that encompasses any technology used to store, retrieve, transmit, and manipulate data or…

Amanda Girard

Information Technology (IT)

Information Technology (IT) Information Technology (IT) is a broad term that encompasses all aspects of managing and processing information, including the use of computers, networks, software, and other technologies. IT…

Amanda Girard

Digital (Business)

Digital (Business) Digital is a term used to describe the use of technology to create, store, process, and communicate information. It is a broad term that encompasses many different types…

Amanda Girard

Digital

Digital Digital is a term used to describe any technology that uses digital signals or data for its operation. Digital technology is based on the use of binary code, which…

Amanda Girard

Database

Database A database is a structured collection of data that is stored in a computer system. It is organized in such a way that it can be easily accessed, managed,…

Amanda Girard

Middleware

Middleware Middleware is a type of software that acts as a bridge between two or more applications, databases, or systems. It is used to facilitate communication and data exchange between…

Amanda Girard

Business Application

Business Application Business applications are software programs that are designed to help businesses automate and streamline their operations. They are used to manage data, automate processes, and provide insights into…

Amanda Girard

Application

Application An application, or “app”, is a computer program designed to help users perform specific tasks. Applications are typically designed to run on a specific operating system, such as Windows,…

Amanda Girard

Software

Software Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It can be divided into two main categories: system software and application…

Amanda Girard

Virtualisation

Virtualisation Virtualisation is a technology that allows a single physical computer to be divided into multiple virtual machines, each of which can run its own operating system and applications. It…

Amanda Girard

Hypervisor

Hypervisor A hypervisor is a type of software that allows multiple operating systems to run on the same physical hardware. It is also known as a virtual machine monitor (VMM)…

Amanda Girard