IT Glossary

#

95th percentile

In networking, the 95th percentile represents the highest sustained data transfer rate over a period, once the top 5% of measured values (outliers) have been excluded, providing a more reliable measure of typical network performance.

A

Access Control List

An access control list is a set of rules that specifies which users, devices, or network traffic are granted or denied access to a specific resource or network.

Active Directory

Active Directory is a comprehensive directory service developed by Microsoft that enables centralized management of devices, users, domains, and network objects within an organization’s IT infrastructure.

Active Directory Groups

Active Directory groups are collections of user accounts, computer accounts, or other groups that allow administrators to manage access permissions, apply policies, and distribute resources efficiently across the network.

Advanced Persistent Threat

An advanced persistent threat is a sophisticated, sustained cyber attack carried out by well-resourced groups, often backed by nation-states, that gain unauthorized access to a network and remain undetected for an extended period of time.

Agentless monitoring

Agentless monitoring enables the assessment of overall network health and performance without requiring the deployment of third-party agent software on monitored systems and devices.

APM

Application performance monitoring (APM) is the continuous practice of tracking the health and responsiveness of software applications.

Application Infrastructure

Application infrastructure is the foundation of an app, encompassing hardware, software, networking, and services that make it run.

Application Pool in IIS

An application pool in IIS is a group of web applications that share worker processes for isolation, security, and performance.

ARP

ARP (Address Resolution Protocol) is a network protocol used to map IP addresses to MAC addresses on a local network.

As a Service

“As a service” refers to a business model where resources, software, or platforms are provided to users on-demand over the internet, typically on a subscription basis.

B

Bandwidth Consumption

Bandwidth consumption refers to the amount of data transferred over a network connection over a specific time period.

C

CIDR

CIDR (Classless Inter-Domain Routing) is a method for efficiently allocating IP addresses and improving internet routing by combining network and subnet mask information into a single notation.

Cloud Computing

Cloud computing is renting computing services like storage, servers, databases, and software over the internet (“the cloud”) for on-demand access.

Computer and Server Operating Systems

Computer and server operating systems are both software that manage a computer’s resources and programs, with server OS specializing in handling multiple users, data, and network services.

Computer Hardware

Computer hardware refers to the physical parts of a computer, like the central processing unit (CPU), memory, and storage devices, that work together to run programs.

Configuration Management Database

A Configuration Management Database (CMDB) is a central repository for information about all the components (hardware, software, services) that make up an IT infrastructure.

Container Technology

Container technology is a method of packaging an application and its dependencies into a standardized unit for software development, ensuring that it runs consistently across different computing environments.

Containerization

Containerization is the process of encapsulating an application and its dependencies into a container to ensure consistent execution across various computing environments.

CPU usage

CPU usage refers to the percentage of time that a computer’s central processing unit is actively executing instructions from running processes or programs.

Cybersecurity

Cybersecurity is the practice of protecting computer systems, networks, and data from unauthorized access, attacks, damage, or theft.

Cyberthreat Intelligence

Cyberthreat intelligence refers to the knowledge and insights gained from monitoring, analyzing, and understanding potential cybersecurity threats, including their sources, methods, and potential impact.

D

Data Storage Management

Data storage management, or IT storage management, encompasses the processes of organizing, optimizing, and overseeing the central repository of big data, which involves the collection, retention, and utilization of digital information using computers and related devices.

Database Cardinality

Database cardinality refers to the number of unique values that can be assigned to a column or attribute in a database table, indicating the relationship between different data sets.

Database Concurrency

Database concurrency refers to the ability of a database management system to handle multiple transactions or operations simultaneously without causing conflicts or data inconsistencies.

Database Management System

A database management system (DBMS) is software that serves as an interface between users and databases, enabling users to create, manage, and access databases by providing tools for storing, organizing, retrieving, and manipulating data.

Database Monitoring

Database monitoring involves continuously observing and analyzing the performance, availability, and security of a database system to ensure optimal functionality and prevent potential issues.

Database Performance Tuning

Database performance tuning is the process of optimizing database configurations, queries, and indexes to enhance efficiency, speed, and overall system responsiveness.

Database Query

A database query is a request for data in database management, written in a specific syntax, used to access, manipulate, delete, or retrieve information from a relational database.

Database Schema

A database schema is the comprehensive blueprint that outlines the logical and visual structure of a relational database.

Database Software

Database software is a system for managing and organizing data, ensuring seamless data storage, monitoring, backup, recovery, and reporting.

DDI

In IT, DDI refers to a suite of networking technologies that automate and centralize the management of DNS (Domain Name System), DHCP (Dynamic Host Configuration Protocol), and IP Address Management into a unified service or solution.

DHCP

DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses and other network configuration settings to devices on a network.

Distributed Network

A distributed network is a complex system where independent networks are interconnected across multiple geographic locations.

Distributed Tracing

Distributed tracing is a method of monitoring and analyzing the flow of requests across distributed systems and services to identify performance bottlenecks and optimize system performance.

Domain Controller

A domain controller acts as a gatekeeper, authenticating and validating user access to a network.

E

Email Spoofing

Email spoofing is a cyberattack technique that involves forging the sender’s email address or domain in an email message to deceive the recipient into believing it’s from a legitimate source.

End User Network Experience Monitoring

End User Network Experience Monitoring allows teams to track and analyze the performance and quality of network services from the perspective of the end user to ensure optimal connectivity and satisfaction.

Enterprise Network

An enterprise network is a large and complex computer network that connects various devices and resources within an organization to enable communication, data sharing, and access to centralized services and applications.

F

File Integrity Monitoring

File integrity monitoring is the process of tracking and detecting changes to files and system configurations to ensure data security and compliance with policies.

File-sharing security

File-sharing security involves implementing measures to protect shared files from unauthorized access, data breaches, and other cyber threats while exchanging sensitive business documents inside or outside the company network.

FTP Server

An FTP (File Transfer Protocol) server is a software application that facilitates file transfer between computers over a TCP/IP network.

H

Help Desk Software

Help desk software is a tool that enables organizations to manage and respond to customer inquiries, technical issues, and support requests efficiently.

High Availability

High availability is the ability of systems or services to remain operational and accessible for a high percentage of the time, often achieved through redundancy and fault tolerance measures.

HTTP

HTTP (Hypertext Transfer Protocol) is the foundational protocol used for transmitting and receiving web pages, documents, and other resources on the internet.

Hyper-V

Hyper-V is a Microsoft hardware virtualization tool that allows users to create and manage virtual machines across various operating systems.

I

IIS Server

Internet Information Services (IIS) server is a Microsoft web server software that provides tools and services for hosting and managing websites and web applications on Windows servers.

Index Fragmentation in SQL Server

Index fragmentation in SQL Server refers to the condition where the logical order of pages in an index does not match the physical order of pages on disk, potentially slowing down query performance.

Indexes in Database

Indexes in databases are data structures that provide an efficient way to quickly access and retrieve records from database files stored on disk drives, enhancing search and retrieval performance.

Insider Threat

An insider threat refers to the potential risk posed by individuals within an organization who may misuse their authorized access to systems, networks, or data for malicious purposes.

IoT

The Internet of Things (IoT) refers to a network of interconnected physical devices, such as sensors, appliances, and vehicles, embedded with electronics, software, and connectivity capabilities that enable these objects to exchange data over the internet.

IPAM

IP Address Management (IPAM) is the process of planning, tracking, and managing IP addresses across networks, encompassing both wired and wireless devices, each requiring an individual IP address.

IPv6

IPv6 (Internet Protocol version 6) is the latest version of the Internet Protocol, designed to replace IPv4, providing a vastly larger address space, improved security features, and enhanced performance to support the continued growth of the internet and the increasing number of connected devices.

IT Asset

IT assets are any hardware, software, or digital resource that an organization utilizes and relies upon to support its information technology infrastructure and operations.

IT Incident

An IT incident is an unplanned event or disruption that negatively impacts the normal operation, functionality, or availability of an organization’s information technology systems, services, or infrastructure.

IT Risk Management

IT risk management is the process of identifying, assessing, and mitigating risks to an organization’s information technology systems to protect data integrity, confidentiality, and availability.

IT Service Management Platform

An ITSM platform is a centralized system that consolidates end-user queries and incidents from multiple sources into a single interface, enabling IT teams to collaborate and resolve them effectively through integrated processes and tools.

ITIL

ITIL (Information Technology Infrastructure Library) is a set of best practices and guidelines for managing and delivering IT services, focusing on aligning IT services with the needs of the business and improving efficiency and effectiveness.

ITIL Service Catalog

The ITIL Service Catalog is a centralized repository of all IT services offered by an organization, detailing service descriptions, service levels, and associated costs, and serving as a key component for service management by providing users and stakeholders with a clear understanding of available IT services and their value.

ITSM

IT Service Management (ITSM) encompasses all activities and processes for designing, delivering, managing, and improving IT services to meet business needs efficiently and effectively.

K

Knowledge Base

A knowledge base refers to a centralized repository of information, including FAQs, how-to guides, video demonstrations, and troubleshooting instructions, systematically organized and accessible to users for problem-solving, decision-making, and learning purposes within an organization or system.

L

Linux Server

A Linux® server is a high-powered computer system that runs the Linux operating system, designed to manage network resources, provide services, and host applications for multiple users.

Log Management

Log management involves the collection, storage, analysis, monitoring, retention, and correlation of log data from various sources to ensure security, performance, and regulatory compliance.

Log Monitoring

Log monitoring is the continuous process of tracking and analyzing log files in real-time to detect and respond to security threats, system errors, and operational issues.

M

Managed Service Provider

A managed service provider (MSP) is a company that remotely manages and assumes responsibility for providing a defined set of IT services to its clients on a proactive basis.

MariaDB

MariaDB is an open-source relational database management system that is a fork of MySQL, designed for speed, reliability, and compatibility with MySQL applications.

Mean Time to Respond

MTTR (Mean Time to Resolution or Repair) is a key IT metric that measures the average time to fully resolve incidents or outages, reflecting the efficiency of incident management processes.

MFT Protocol

MTF protocol (Morse Technology Format) facilitates secure data transfer between points using the SEP/ADIO technological unit.

MIB

MIB (Management Information Base) is a database storing parameters and control information for managing network devices and systems, facilitating monitoring and configuration through SNMP (Simple Network Management Protocol).

MySQL Database

MySQL Database is an open-source relational database management system that uses SQL (Structured Query Language) for managing and manipulating data.

N

Netflow

NetFlow is a network protocol used to monitor and analyze IP traffic flow by collecting data on source and destination addresses, ports, and protocols.

Network Access Control

Network Access Control (NAC) refers to the security strategy and technologies used to regulate and manage access to a network based on policies, ensuring only authorized devices and users can connect and interact with network resources such as network routers, conventional PCs, IoT devices, and more.

Network Activity

Network activity encompasses the flow of network traffic, including messages from network protocols, packet transmissions, device status events, and more, crucially monitored to identify bottlenecks affecting network performance, health, and uptime.

Network Administration

Network administration involves the management, operation, and maintenance of computer networks to ensure they function efficiently, securely, and reliably to meet organizational needs.

Network Administrator

A network administrator oversees the security, reliability, and performance of computer networks by proactively identifying and resolving issues.

Network Automation

Network automation involves using software tools and scripts to automate the configuration, management, and operation of network devices and services, reducing manual intervention and enhancing efficiency.

Network Availability

Network availability, also known as network uptime, refers to the measure of a network’s operational readiness and accessibility for users, typically expressed as a percentage representing the uptime relative to total possible uptime over a given period.

Network Backup

Network backup refers to the process of copying and archiving data from a network to ensure its availability and recoverability in case of data loss or system failure.

Network Bandwidth

Network bandwidth is the maximum data transfer rate of a network or internet connection, measured in bits per second (bps), that determines its capacity to transmit data.

Network Capacity

Network capacity refers to the maximum amount of data that a network can handle or the total throughput it can sustain, typically measured in bits per second (bps) or packets per second (pps).

Network Configuration

Network configuration is the arrangement and settings of network devices and services, including routers, switches, firewalls, and IP addresses, to enable communication and functionality within a network infrastructure.

Network Configuration Compliance

Network configuration compliance ensures that network devices and settings adhere to established standards, policies, and security requirements to maintain operational integrity and security for standards like HIPAA and PCI DSS.

Network Congestion

Network congestion occurs when the amount of data being transmitted exceeds the network’s capacity, leading to performance degradation and potential packet loss.

Network Devices

Network devices such as routers, switches, hubs, and gateways facilitate communication and data transfer within a computer network.

Network Discovery

Network discovery is the process of finding and identifying devices on a network, helping with management and security.

Network Downtime

Network downtime refers to periods when a network or its services are unavailable or inaccessible, typically due to maintenance, technical issues, or failures, resulting in interrupted communication and operations.

Network Infrastructure

Network infrastructure comprises the essential software and hardware components necessary for constructing, operating, and sustaining an IT network.

Network Management

Network management encompasses the setup, administration, and ongoing maintenance of a network, which includes troubleshooting to ensure optimal and reliable performance.

Network Monitoring

Network monitoring is the essential IT practice of discovering, mapping, and observing the performance and health of computer networks and their components to ensure smooth operation and detect issues promptly.

Network Node

A network node is a fundamental component of a network infrastructure, serving as a connection point for devices like routers, printers, or switches, enabling the transmission and reception of data between endpoints.

Network Optimization

Network optimization involves enhancing the efficiency and performance of a computer network through various techniques such as traffic management, bandwidth allocation, and configuration adjustments.

Network Performance Metrics

Network performance metrics are quantitative measures used to evaluate the efficiency, reliability, and speed of a network, including metrics like bandwidth, latency, packet loss, and throughput.

Network Protocols

Network protocols are standardized rules that define how data is transmitted and received between devices on a network.

Network Topology

Network topology provides a visual representation and description of how devices, such as routers and switches, are interconnected and organized in both logical and physical configurations within a network.

Network Troubleshooting

Network troubleshooting encompasses the systematic identification, measurement, and resolution of network issues, serving as a structured approach followed by network engineers to optimize network performance and reliability.

Network Visualization

Network visualization refers to the graphical representation of network infrastructure, traffic flows, or data interactions to facilitate analysis, monitoring, and management of networks.

NoSQL Database

A NoSQL database is a non-relational database system that provides flexible and scalable data storage solutions, often used for handling large volumes of unstructured or semi-structured data.

O

Observability

Observability in IT refers to the ability to measure and understand the internal state of a system based on its external outputs or behaviors, facilitating effective monitoring and troubleshooting.

Oracle Database

An Oracle Database is a relational database management system known for its scalability, reliability, and robust feature set, developed by Oracle Corporation.

OSI Layers

OSI (Open Systems Interconnection) layers refer to a conceptual framework that standardizes the functions of communication systems into seven hierarchical layers, facilitating interoperability between different computer systems.

OSPF

OSPF (Open Shortest Path First) is a routing protocol used in IP networks to determine the best paths for data traffic based on the shortest path algorithm.

P

Packet Capture

Packet capture is the process of intercepting and recording data packets as they traverse a computer network, allowing for detailed analysis and troubleshooting of network communications.

Packet Discard

A packet discard occurs when a received packet either contains transmission or format errors or cannot be stored due to insufficient storage space on the receiving device.

Packet Loss

Packet loss occurs when data packets transmitted over a network do not reach their intended destination, potentially causing data loss and affecting network performance.

Patch Management Software

Patch management software is tools used to automate the deployment and management of updates (patches) to software and systems, ensuring security vulnerabilities are addressed and systems remain up-to-date.

Ping

Ping is a networking utility used to test the reachability of a host on an Internet Protocol (IP) network and measure the round-trip time for data packets sent from the source to the destination.

Q

QoS

QoS (Quality of Service) comprises technologies designed to optimize network performance by prioritizing critical, resource-intensive applications to ensure reliable and efficient data transmission.

R

Real User Monitoring (RUM)

Real user monitoring (RUM), also referred to as end-user experience monitoring, offers real-time insights into the issues impacting user experience as they interact with your website.

Remote Access

Remote access facilitates secure connectivity for users to access internal network resources, including IT services, data, and applications, from any geographical location outside the organization’s premises.

Remote Desktop Protocol

Remote Desktop Protocol (RDP) allows users to remotely access and manage both physical and virtual Windows-based devices with enhanced control and functionality.

Remote Desktop Services

Remote Desktop Services (RDS) enables users to remotely access and manage Window’s applications and devices over a network, facilitating tasks such as troubleshooting, updates, maintenance, and centralized management of multiple computers from any location with internet access and appropriate credentials.

Reverse Proxy

A reverse proxy is a server that retrieves resources on behalf of clients from one or more servers, providing benefits such as load balancing, security, and caching.

Role-Based Access Control

Role-based access control (RBAC) is a method of restricting network and system access based on a user’s role within an organization, ensuring appropriate permissions for data protection and security.

Root Cause Analysis

Root cause analysis in IT refers to a systematic approach used to identify the fundamental reason behind a problem or issue affecting systems, networks, or software, aiming to prevent recurrence through targeted solutions.

S

SD-WAN

SD-WAN is a software-defined networking overlay that separates WAN configuration and management from the underlying network transport (such as 5G/LTE, MPLS, xDSL), dynamically routing WAN traffic for enhanced administration and optimized performance.

Security Information and Event Management

Security Information and Event Management (SIEM) combines Security Information Management (SIM) for centralized log data aggregation and analysis with Security Event Management (SEM) for real-time monitoring and response to security incidents.

Server Infrastructure

Server infrastructure encompasses both physical and virtual resources, including hardware, software, and network components, essential for managing and supporting servers within an IT environment.

Service Level Agreement

A service level agreement (SLA) is a contract that defines the level of service expected, including metrics such as availability, performance, and support response times, between a service provider and a customer.

SharePoint Permissions

SharePoint permissions control access to content and functionality within SharePoint sites, specifying who can view, edit, and manage documents and resources based on defined roles and permissions levels.

SLA management

SLA management involves the process of monitoring, enforcing, and optimizing service level agreements (SLAs) between service providers and customers to ensure agreed-upon performance metrics and standards are consistently met or exceeded.

SNMP

SNMP (Simple Network Management Protocol) is a standard protocol used for monitoring and managing devices on IP networks.

SNMP Trap

An SNMP trap is an unsolicited notification message sent from a network device, such as a router, switch, or server, to a designated SNMP management system, informing administrators of specific events or conditions that require attention, including crucial details like device identity, time of occurrence, and severity or nature of the issue.

SNMP Walk

SNMP walk is a utility that systematically collects SNMP data from network devices like switches and routers using SNMP GETNEXT requests, providing comprehensive insights into device configurations and status.

Software-Defined Networking (SDN)

SDN, or Software-Defined Networking, is an architectural approach that separates network control and forwarding functions, enabling centralized management and programmability of network infrastructure through software-based controllers.

SQL Database

SQL database or relational database store data in tables linked by predefined relationships, facilitating structured data storage and retrieval using SQL (Structured Query Language).

SQL Performance Tuning

SQL Performance Tuning is the process of optimizing SQL queries and database performance to ensure efficient data retrieval and overall system responsiveness.

SQL Server Agent

SQL Server Agent is a component of Microsoft SQL Server that automates and schedules tasks such as backups, database maintenance, and job execution.

SQL Server Analysis Services

SQL Server Analysis Services (SSAS) is a component of Microsoft SQL Server that functions as a multidimensional OLAP server and analytics engine, enabling IT professionals to organize large volumes of data into searchable cubes for easier analysis and data mining.

SQL Server Integration Services

SQL Server Integration Services (SSIS) is a component of Microsoft SQL Server designed as a high-performance, flexible data warehousing tool for efficient data integration and transformation tasks.

SSIS Components

SSIS Components are the building blocks of SQL Server Integration Services (SSIS), including tasks, transformations, connections, and control flow elements used for data extraction, transformation, and loading (ETL) processes.

SSL certificate

SSL certificates are digital certificates that authenticate the identity of a website and enable an encrypted connection to ensure secure data transmission over the internet.

Storage Resource Monitoring

Storage Resource Monitoring (SRM) involves tracking the performance and capacity of storage arrays to identify and address any storage-related issues that could slow down your system.

Subnetting

Subnetting is the practice of dividing a larger IP network into smaller, more manageable sub-networks to improve routing efficiency and enhance security.

Synthetic Monitoring

Synthetic monitoring, also known as active monitoring, uses automated scripts to simulate real user actions, proactively identifying and resolving website availability, performance, and functionality issues before they impact end users.

Syslog

Syslog is a standard protocol used to send system log or event messages to a centralized server for monitoring, analysis, and troubleshooting.

T

T-SQL

T-SQL (Transact-SQL) is an extension of SQL used in Microsoft SQL Server for programming, managing, and querying relational databases with additional procedural and control-flow capabilities.

U

Uptime

Uptime is a metric that measures the availiability of a a computer system, network, or service and is typically measured as a percentage of total time within a specified period.

V

Virtual machine

A virtual machine (VM) is a software-based emulation of a physical computer that operates within a separate environment, enabling multiple virtualized instances to run simultaneously on a single physical machine.

Virtualization VM

Virtualization is the process of creating virtual instances of computing resources such as virtual machines (VMs), allowing multiple operating systems and applications to run independently on a single physical hardware platform.

VLAN

A VLAN (Virtual Local Area Network) is a segmented network that logically groups devices across different physical LANs, facilitating efficient communication while enhancing network security and management capabilities.

Vulnerability Assessment

Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in computer systems, networks, and applications to proactively manage and mitigate potential security risks.

W

Web Server

A web server is software or hardware that serves web pages and content to users over the internet or intranet in response to requests.

Website Monitoring

Website monitoring involves testing a website or web service for availability, performance, and functionality, ensuring that it operates reliably and meets user expectations.

Wi-Fi Heat Map

A WiFi heat map is a graphical representation showing the signal strength and coverage areas of a wireless network, helping to optimize placement of access points.

Window Server Update Services

Windows Server Update Services (WSUS) is a Microsoft server role that allows IT administrators to manage and distribute updates for Windows operating systems and other Microsoft software within a network.

Windows Event Log

The Windows Event Log is a comprehensive record of system, security, and application events stored on a Windows operating system, invaluable for tracking issues, monitoring applications, and predicting future problems.

Windows Server

Windows Server is a server operating system developed by Microsoft that provides server-oriented services such as user authentication, file and print sharing, web services, and network management.

Z

Zero Trust Security

Zero trust security is a cybersecurity framework that assumes no one can by trusted both inside and outside a network and requires strict identity verification for every person and device attempting to access resources.