HPE Server rack (on-premise data centre)

IT Glossary

From enterprise infrastructure to cyber security, learn the definitions to the IT terms used by us and our partners. 

Devices

BIOS (Basic Input/Output System)

A crucial firmware interface embedded in a computer’s motherboard, serving as the foundational set of instructions and low-level software that facilitates communication between the operating system and the computer’s hardware components during the boot process. The BIOS plays a pivotal role in initializing and configuring the system’s hardware, ensuring that all components are ready and functioning before the operating system takes over. This process includes tasks such as checking the system’s hardware integrity, setting up basic hardware configurations, and identifying bootable devices. The BIOS is essential for the smooth and efficient start-up of a computer, laying the groundwork for the operating system to control the computer’s operations.

Data Backup and Recovery

The process of creating copies of important files, documents, databases, or entire systems to safeguard against data loss. This precaution is essential in scenarios such as accidental deletion, hardware failure, data corruption, or other unforeseen events that could compromise data integrity. Regular data backups are a fundamental component of any robust data management and security strategy, ensuring that critical information can be recovered and restored in the event of data loss. By maintaining up-to-date backups, organisations and individuals can protect themselves against significant disruptions and ensure the continuity of their operations or personal data management.

Device as a Service (DaaS)

A subscription-based model enabling organisations to acquire and manage hardware devices, like computers, laptops, tablets, smartphones, and other technology equipment, as a comprehensive service rather than through outright purchases. In a DaaS arrangement, businesses lease or subscribe to these devices from a service provider, typically on a monthly basis. This model offers flexibility, as it allows companies to easily scale up or down according to their changing needs. DaaS also simplifies the management of IT resources, as it often includes support, maintenance, and regular upgrades, thereby reducing the burden of managing technology lifecycle and allowing businesses to focus on core operations.

End User Compute (EUC)

End User Computing (EUC) refers to the technologies and services that are designed to provide end users—individuals or employees in an organisation—with the tools and resources needed to perform their tasks efficiently and effectively. End User Computing encompasses a broad range of technologies, devices, applications, and services. Examples of these tools include laptops, tablets, notebooks, desktops and software. 

Learn More >
Firmware Update

This process involves updating the software embedded in electronic devices. This software, known as firmware, is typically found in hardware components such as the BIOS/UEFI of a computer, the firmware of a router, the operating system of a smart TV, or the software controlling a digital camera’s components. Firmware is a special type of software intimately linked to specific hardware and is crucial for managing the functionality of that hardware. Regular firmware updates are essential for several reasons: they can fix bugs, enhance security, improve compatibility with other devices or software, add new features, and optimize performance. Staying up-to-date with firmware updates ensures that devices run efficiently and securely, maintaining their functionality and reliability over time.

Graphics Processing Unit (GPU)

A specialised electronic circuit designed to accelerate the processing of graphics and images. GPUs are adept at handling the intricate calculations and data parallelism needed for rendering high-quality graphics in real-time applications such as video games, simulations, and graphic design software. Initially conceived for graphics rendering, GPUs have evolved to become integral in general-purpose computing tasks that require parallel processing. This extended role, known as General-Purpose computing on Graphics Processing Units (GPGPU), leverages the GPU’s ability to perform complex computations more efficiently than traditional CPUs for tasks like machine learning, scientific simulations, and big data analysis. GPUs have thus become a critical component in both advanced graphics processing and a range of high-performance computing applications.

Hard-Disc Drive (HDD)

A conventional data storage device utilising magnetic storage technology to store and retrieve digital information. HDDs have long been the standard storage medium in computers. They are composed of one or more spinning disks, or platters, that are magnetically sensitive, and read/write heads that swiftly move across these platters’ surfaces to access or modify data. This mechanism allows for the storage and retrieval of large amounts of data. The entire assembly of an HDD, including the platters and read/write heads, is encased within a sealed casing to protect against external contaminants and damage. HDDs are known for their durability and capacity, making them a reliable choice for bulk data storage in various computing environments.

IT Procurement

The process of acquiring and purchasing IT hardware, software, and services for an organisation. This encompasses selecting suitable vendors, negotiating terms and prices, and managing IT assets and contracts. IT procurement is a critical function that ensures an organisation has the necessary technology tools and solutions to operate effectively and meet its strategic objectives. This process involves evaluating the technical and financial aspects of potential IT investments, ensuring compliance with company policies and standards, and maintaining ongoing relationships with suppliers. Effective IT procurement contributes to optimising costs, enhancing operational efficiency, and ensuring the quality and reliability of IT resources.

IT Procurement

The process of acquiring and purchasing IT hardware, software, and services for an organisation. This encompasses selecting suitable vendors, negotiating terms and prices, and managing IT assets and contracts. IT procurement is a critical function that ensures an organisation has the necessary technology tools and solutions to operate effectively and meet its strategic objectives. This process involves evaluating the technical and financial aspects of potential IT investments, ensuring compliance with company policies and standards, and maintaining ongoing relationships with suppliers. Effective IT procurement contributes to optimising costs, enhancing operational efficiency, and ensuring the quality and reliability of IT resources.

Mobile Workstation

A specialised, high-performance laptop designed for professional users who require exceptional computing power and advanced graphics capabilities. These devices cater to tasks that demand substantial processing resources, such as computer-aided design (CAD), 3D modelling, video editing, scientific simulations, and other graphics-intensive applications. Mobile workstations are engineered to provide desktop-level performance, incorporating powerful processors, high-end graphics cards, and substantial memory and storage capacities. Despite their robust capabilities, they maintain the portability and flexibility of a laptop, allowing professionals to work effectively from various locations. These workstations are an ideal solution for users who need to manage complex, resource-intensive tasks while on the move.

Infrastructure

AI in Finance

The application of artificial intelligence and machine learning technologies within the financial sector, aimed at enhancing and automating various financial processes. This includes streamlining risk analysis, refining investment strategies, and improving customer service. AI in finance represents a transformative approach, leveraging sophisticated algorithms and data analysis techniques to bring efficiency, accuracy, and innovation to financial operations.

Cloud Computing

The provision of a range of computing services — such as servers, storage, databases, networking, and software — over the internet, commonly referred to as “the cloud”. This model of computing is renowned for its scalability, flexibility, and cost-effectiveness. Cloud computing allows organisations to use resources on demand, paying only for what they use, which can significantly reduce costs and increase operational efficiency. It also provides the flexibility to scale resources up or down as needed, making it a versatile solution for businesses of all sizes and sectors. The ease of access to advanced computing capabilities without the need for substantial upfront investment is a key aspect of cloud computing’s growing popularity.

Cloud Cost Management

The practice of optimizing and controlling the costs associated with using cloud services. This involves careful monitoring of usage, precise allocation of costs, and the implementation of strategies to save costs. Effective cloud cost management ensures that organizations make the most of their cloud investments by avoiding over-provisioning, underutilization, and unexpected expenses. It is a critical aspect of managing cloud infrastructure, helping businesses to maintain financial efficiency while benefiting from cloud technology.

Cloud Migration

The process of transferring applications, data, and workloads from on-premises systems or one cloud platform to another. This procedure encompasses thorough planning, detailed assessment, and strategic execution of the migration strategy. Cloud migration is a pivotal step for organisations looking to harness the benefits of cloud computing, such as increased flexibility, scalability, and cost efficiency. It requires careful consideration of factors such as compatibility, security, and potential downtime to ensure a smooth transition.

Cloud Scalability

The capacity to dynamically adjust cloud resources, like virtual servers and storage, in response to fluctuating workloads and demand. This adaptability is a fundamental characteristic of cloud computing, enabling organisations to efficiently scale their IT infrastructure up or down. Cloud scalability ensures optimal resource utilization, cost-effectiveness, and continuous performance alignment with business needs, making it a critical aspect for enterprises leveraging cloud technologies.

Compute

Refers to the processing power and resources available in a computer or server, used primarily for data processing, calculations, and running applications. This term is a fundamental component of IT infrastructure, encompassing the capabilities of a system to execute tasks and handle workloads. Compute resources determine the efficiency and speed with which a system can process information and support various applications. The term is essential in understanding and managing IT environments, as it directly impacts the performance and scalability of technology solutions within an organisation.

Converged Infrastructure

An integrated, pre-configured solution that amalgamates computing, storage, networking, and virtualisation resources into a single package. This approach streamlines data centre management and deployment, offering a more simplified and efficient way to handle complex IT environments. Converged infrastructure is designed for ease of use and scalability, providing a cohesive system that enhances operational efficiency and reduces the complexity traditionally associated with managing disparate IT components.

Data Insights

This term refers to the valuable information gleaned from data analysis, involving the identification and exploration of trends, patterns, and useful knowledge within data sets. These insights are instrumental in informing decision-making and guiding business strategies. By analysing data, organisations can gain a deeper understanding of their market, customer behaviours, operational efficiencies, and more, leading to more informed and strategic choices. Data insights enable businesses to transform raw data into actionable intelligence, playing a crucial role in driving innovation, improving customer experiences, and achieving competitive advantages in their respective industries.

Data Storage

Refers to the physical and digital systems and devices utilised for storing and managing data. This broad term includes a variety of storage solutions, ranging from traditional hard drives to more advanced solid-state drives, as well as cloud-based storage options. Data storage is a critical component of IT infrastructure, enabling the retention, retrieval, and maintenance of data essential for daily operations and long-term strategic decision-making. The choice of storage solution often depends on factors such as capacity needs, speed requirements, security considerations, and budget constraints, making data storage a key area of focus in IT planning and management.

Learn More >
Disaggregated Storage

This concept involves separating storage resources from compute resources within a data centre, thereby offering enhanced flexibility and scalability. By disaggregating storage, organisations can allocate storage capacity more efficiently, tailoring it to where it’s most needed without being constrained by the physical limitations of traditional compute-storage setups. This approach allows for more efficient use of resources, as storage can be scaled independently of computing power. Disaggregated storage is particularly beneficial for businesses with fluctuating storage needs, as it facilitates the optimal distribution of storage resources across various applications and workloads.

Disaster Recovery as a Service (DRaaS)

A cloud-based solution offering data backup, failover, and recovery capabilities to protect against disasters or system failures. DRaaS is designed to ensure business continuity by enabling rapid restoration of data and systems following an unexpected event. This service minimizes downtime and data loss, providing a safety net for businesses by maintaining operational resilience in the face of challenges. DRaaS is an essential component of modern disaster recovery strategies, offering scalable, flexible, and cost-effective solutions for safeguarding critical business functions.

Print

Automatic Document Feeder (ADF)

A feature typically found in printers, scanners, and multifunction printers, designed to automate the process of scanning or copying multiple pages of a document. With an ADF, users can load a stack of pages into the feeder, and the device will automatically feed each page in sequence for scanning or copying. This eliminates the need for manual intervention for each page, significantly enhancing efficiency and convenience, especially when dealing with large documents. The ADF feature is highly valued in office environments and among professionals who frequently handle multi-page documents, as it streamlines the document handling process and saves considerable time.

Capture & Workflow

This term refers to a suite of processes and technologies focused on efficiently capturing, managing, and processing documents throughout their lifecycle. It involves the digitisation of physical documents, transforming them into electronic formats that can be easily managed and processed. Once digitised, these documents are routed through predefined workflows tailored to specific business processes. Capture & Workflow technologies automate various tasks associated with document processing, such as data extraction, categorisation, and distribution, thereby enhancing efficiency and reducing manual workload. This approach streamlines document handling, from initial capture to final archiving or disposal, ensuring that documents are processed quickly, accurately, and consistently.

Learn More >
Duplex Printing

Also known as double-sided printing, this is a feature in printers that enables automatic printing on both sides of a sheet of paper. Duplex printing is an environmentally friendly option that helps in saving paper, thereby reducing printing costs and contributing to sustainability efforts. It also creates more compact documents, which is beneficial for producing professional-looking reports, booklets, and brochures. When this feature is enabled, the printer automatically flips the paper after printing on one side and then proceeds to print on the reverse side. This functionality not only optimizes resource use but also enhances convenience and efficiency in printing tasks. Duplex printing is a valuable feature for both office and personal use, supporting eco-conscious printing practices.

Duplex Printing

Also known as double-sided printing, this is a feature in printers that enables automatic printing on both sides of a sheet of paper. Duplex printing is an environmentally friendly option that helps in saving paper, thereby reducing printing costs and contributing to sustainability efforts. It also creates more compact documents, which is beneficial for producing professional-looking reports, booklets, and brochures. When this feature is enabled, the printer automatically flips the paper after printing on one side and then proceeds to print on the reverse side. This functionality not only optimizes resource use but also enhances convenience and efficiency in printing tasks. Duplex printing is a valuable feature for both office and personal use, supporting eco-conscious printing practices.

Duty Cycle

The duty cycle denotes the recommended maximum monthly page output for a printer without encountering undue wear or performance issues. This crucial specification, furnished by printer manufacturers, aids users in comprehending the designated workload capacity of a specific printer model.

Duty Cycle

The duty cycle denotes the recommended maximum monthly page output for a printer without encountering undue wear or performance issues. This crucial specification, furnished by printer manufacturers, aids users in comprehending the designated workload capacity of a specific printer model.

LaserJet Printer

LaserJet Printer: A LaserJet printer is a type of printer renowned for using laser technology to deliver high-quality text and graphics on paper. The term “LaserJet” is particularly associated with printers manufactured by Hewlett-Packard (HP), a leading name in the printing industry. HP’s LaserJet printers are synonymous with laser printing technology, embodying reliability, efficiency, and superior print quality. These printers work by deploying a laser beam to produce precise and sharp images and text, making them ideal for both professional and personal use, especially in scenarios where clarity and detail are paramount. Over the years, HP’s LaserJet printers have set a benchmark in the industry for their consistent performance and innovative technology.

Managed Print Services (MPS)

Managed Print Solutions: Managed Print Services (MPS) represent a comprehensive solution designed to optimise and manage an organisation’s printing and imaging infrastructure. The primary objective of MPS is to control and reduce costs, improve efficiency, and enhance document security within the print environment. This is achieved through a thorough assessment of the current printing needs and workflows, followed by the implementation of tailored strategies to streamline operations. MPS encompasses aspects such as monitoring usage, managing supplies, maintaining equipment, and implementing sustainable printing practices. Additionally, it focuses on improving document workflow and implementing security measures to protect sensitive information. By adopting Managed Print Services, organisations can ensure a more efficient, secure, and cost-effective print environment.

Learn More >
Multifunctional Printer (MFP)

Multifunctional Printer (MFP): An MFP, commonly referred to as an All-in-One (AiO) printer, is a versatile device that amalgamates various office functions into one comprehensive machine. Going beyond the standard printing capabilities, MFPs incorporate additional features such as scanning, copying, and faxing. This multifaceted nature makes them highly efficient and space-saving solutions, suitable for both office and home environments. Designed to simplify and enhance document-related tasks, MFPs are instrumental in boosting overall productivity. Their ability to perform multiple functions reduces the need for separate devices, thereby saving space and resources while offering the convenience of handling various tasks through a single piece of equipment.

Print Mailroom Service

Print Mailroom Service: This service is an outsourced solution designed to handle the printing and mailing needs of businesses or organisations. It streamlines and optimises the production and delivery of a wide range of printed materials, such as invoices, statements, marketing collateral, and other documents intended for distribution to customers, clients, or other recipients. By leveraging a Print Mailroom Service, organisations can significantly enhance the efficiency and effectiveness of their mailing processes. This service ensures timely and professional handling of outbound communications, reducing the internal workload and resource allocation typically associated with large-scale printing and mailing tasks. It’s an ideal solution for organisations looking to improve operational efficiency and maintain consistent, high-quality communication with their stakeholders.

Learn More >
Print Security as a Service

Print Security as a Service (PSaaS): PSaaS is a specialised service offering that concentrates on enhancing the security of an organisation’s printing and imaging infrastructure. Recognizing that print security is often an overlooked aspect of an organisation’s overall cybersecurity strategy, this managed service is tailored to address the unique security challenges inherent in printing environments. PSaaS becomes particularly crucial in settings where sensitive information is regularly printed. The service includes implementing robust security protocols and measures to protect against unauthorized access, data breaches, and other security threats within the print environment. By adopting PSaaS, organisations can ensure that their printing operations are not only efficient but also secure, safeguarding critical information and maintaining compliance with data protection standards.

Learn More >

Security

Blue Team

Blue Team in Cybersecurity: In the realm of cybersecurity, the term “Blue Team” designates the group responsible for the defensive aspects of security operations within an organisation. The primary role of the Blue Team is to maintain and enhance the organisation’s security posture. This involves actively defending against cyber threats, continuously monitoring for potential security incidents, and implementing robust measures to prevent and mitigate possible breaches. The Blue Team’s tasks include regular system assessments, vulnerability management, and the development of comprehensive security protocols. By focusing on defense, the Blue Team plays a crucial role in safeguarding an organisation’s digital assets and ensuring the integrity and confidentiality of its data and systems.

Cloud Security

Cloud Security: This term encompasses the set of policies, technologies, and controls implemented to protect data, applications, and infrastructure within cloud computing environments. Cloud security is a vital component of utilising cloud services, particularly as organisations increasingly store and process sensitive information on third-party cloud platforms. The primary objective of cloud security is to safeguard the confidentiality, integrity, and availability of data and services hosted in the cloud. It addresses the unique challenges and risks posed by cloud computing, such as data breaches, unauthorized access, and the secure management of cloud resources. Implementing robust cloud security measures is essential for ensuring that cloud-based assets are protected against evolving cyber threats and maintaining trust in cloud computing technologies.

Cyber Security

Cyber Security: This term refers to the practice of protecting computer systems, networks, devices, and data from various threats, including theft, damage, and unauthorised access, as well as defending against cyberattacks. It involves a comprehensive set of technologies, processes, and practices that are specifically designed to safeguard information technology (IT) assets. Cyber security is essential in today’s digital world, where the sophistication and frequency of cyber threats are continually rising. Effective cyber security measures are crucial for preventing attacks that can compromise the confidentiality, integrity, and availability of information. These measures not only protect against data breaches and financial losses but also help in maintaining the trust and reputation of organisations in the digital landscape.

Learn More >
Data Breach

Data Breach: A data breach occurs when there is unauthorized access, acquisition, disclosure, or loss of sensitive information held by an organization. During a data breach, confidential data, which could include personal data, financial information, intellectual property, trade secrets, and other types of confidential or proprietary data, is exposed to individuals or entities who are not authorised to access or possess it. Such incidents pose significant risks, potentially leading to financial losses, legal repercussions, and damage to the organisation’s reputation. Protecting against data breaches is a critical aspect of cybersecurity, requiring robust security measures and protocols to safeguard sensitive information from such unauthorized access or exposure.

Data Encryption Standard (DES)

Data Encryption Standard (DES): The Data Encryption Standard (DES) is a symmetric key algorithm used for encrypting and decrypting electronic data. Recognised as one of the earliest encryption standards, DES was widely adopted for securing sensitive information and communications. Although it has been superseded by more advanced encryption technologies due to its shorter key length, DES played a pivotal role in the development of data security protocols. It laid the groundwork for modern encryption techniques, highlighting the importance of robust cryptographic methods in protecting digital information from unauthorized access and cyber threats.

Edge Security

Edge Security: This term refers to the practice of securing devices and data located at the edge of a network, a critical area where potential vulnerabilities can arise. Edge security is particularly relevant in environments that incorporate Internet of Things (IoT) devices and edge computing infrastructure. This security approach involves implementing measures to protect against unique threats faced by these technologies, such as unauthorised access, data breaches, and other forms of cyberattacks. By focusing on securing the periphery of the network, edge security plays a crucial role in safeguarding the integrity and confidentiality of data as it is processed and transmitted in real-time, thereby reinforcing the overall cybersecurity posture of an organisation.

Endpoint Security

Endpoint Security: This term refers to the security measures focused on protecting individual devices, known as ‘endpoints’, that are connected to a network. These endpoints can include computers, laptops, smartphones, and other network-capable devices. Endpoint security is crucial in defending these devices against various cyber threats such as malware, ransomware, and unauthorised access, which can lead to data breaches. The protective measures typically encompass antivirus software, firewalls, and advanced threat detection and response systems. By securing these endpoints, organisations effectively minimise the risk of cyberattacks and data compromise, ensuring the safety and integrity of their network and sensitive information.

Learn More >
Firewall

Firewall: A firewall is a crucial network security device or software that oversees and regulates incoming and outgoing network traffic based on established security rules. Its primary function is to create a defensive barrier between a trusted internal network and untrusted external networks, such as the internet. This is achieved by scrutinizing data packets and determining whether they should be allowed to enter or leave the network, following a set of predefined rules. Firewalls can be hardware-based, software-based, or a combination of both, and are essential for protecting networks from unauthorized access, cyberattacks, and other security threats. By acting as a gatekeeper, firewalls play a key role in maintaining the security and integrity of an organization’s network infrastructure.

Insider Threat

Insider Threat: In the realm of cybersecurity, an insider threat is a risk that arises from individuals within an organization who have access to its information systems, data, or network security. These individuals may include employees, contractors, or business partners, all of whom possess authorized access to the organization’s systems and data. Insider threats can stem from intentional malicious actions or unintentional security breaches. Such threats are particularly challenging to detect and manage because they originate from within the organization, often bypassing conventional security measures designed to thwart external attacks.

Integrity Verification

Integrity Verification: This process is key in ensuring the authenticity, accuracy, and completeness of data or files. It typically involves the use of cryptographic techniques to detect unauthorised changes or tampering. Integrity verification is crucial in maintaining the trustworthiness of data, especially in environments where data security and integrity are paramount. This process is employed in various scenarios, ranging from securing financial transactions to verifying the integrity of software downloads, ensuring that the data or files have not been altered in an unauthorised manner.

Malware

Malware: Short for malicious software, malware refers to any software that is intentionally designed to cause harm to a computer, server, network, or user. It encompasses a wide range of types, each with its own purpose and method of infection. The intentions behind malware vary and can include stealing sensitive information, disrupting computer operations, gaining unauthorized access to systems, or causing other types of damage. Common types of malware include viruses, worms, trojan horses, ransomware, and spyware. Understanding and protecting against malware is a critical aspect of cybersecurity, as it poses a significant threat to the integrity and security of digital systems and data.