HPE Server rack (on-premise data centre)

IT Glossary

From enterprise infrastructure to cyber security, learn the definitions to the IT terms used by us and our partners. 

Devices

End User Compute (EUC)

End User Computing (EUC) refers to the technologies and services that are designed to provide end users—individuals or employees in an organisation—with the tools and resources needed to perform their tasks efficiently and effectively. End User Computing encompasses a broad range of technologies, devices, applications, and services. Examples of these tools include laptops, tablets, notebooks, desktops and software. 

Learn More >
Mobile Workstation

A specialised, high-performance laptop designed for professional users who require exceptional computing power and advanced graphics capabilities. These devices cater to tasks that demand substantial processing resources, such as computer-aided design (CAD), 3D modelling, video editing, scientific simulations, and other graphics-intensive applications. Mobile workstations are engineered to provide desktop-level performance, incorporating powerful processors, high-end graphics cards, and substantial memory and storage capacities. Despite their robust capabilities, they maintain the portability and flexibility of a laptop, allowing professionals to work effectively from various locations. These workstations are an ideal solution for users who need to manage complex, resource-intensive tasks while on the move.

IT Procurement

The process of acquiring and purchasing IT hardware, software, and services for an organisation. This encompasses selecting suitable vendors, negotiating terms and prices, and managing IT assets and contracts. IT procurement is a critical function that ensures an organisation has the necessary technology tools and solutions to operate effectively and meet its strategic objectives. This process involves evaluating the technical and financial aspects of potential IT investments, ensuring compliance with company policies and standards, and maintaining ongoing relationships with suppliers. Effective IT procurement contributes to optimising costs, enhancing operational efficiency, and ensuring the quality and reliability of IT resources.

Hard-Disc Drive (HDD)

A conventional data storage device utilising magnetic storage technology to store and retrieve digital information. HDDs have long been the standard storage medium in computers. They are composed of one or more spinning disks, or platters, that are magnetically sensitive, and read/write heads that swiftly move across these platters’ surfaces to access or modify data. This mechanism allows for the storage and retrieval of large amounts of data. The entire assembly of an HDD, including the platters and read/write heads, is encased within a sealed casing to protect against external contaminants and damage. HDDs are known for their durability and capacity, making them a reliable choice for bulk data storage in various computing environments.

Graphics Processing Unit (GPU)

A specialised electronic circuit designed to accelerate the processing of graphics and images. GPUs are adept at handling the intricate calculations and data parallelism needed for rendering high-quality graphics in real-time applications such as video games, simulations, and graphic design software. Initially conceived for graphics rendering, GPUs have evolved to become integral in general-purpose computing tasks that require parallel processing. This extended role, known as General-Purpose computing on Graphics Processing Units (GPGPU), leverages the GPU’s ability to perform complex computations more efficiently than traditional CPUs for tasks like machine learning, scientific simulations, and big data analysis. GPUs have thus become a critical component in both advanced graphics processing and a range of high-performance computing applications.

Firmware Update

This process involves updating the software embedded in electronic devices. This software, known as firmware, is typically found in hardware components such as the BIOS/UEFI of a computer, the firmware of a router, the operating system of a smart TV, or the software controlling a digital camera’s components. Firmware is a special type of software intimately linked to specific hardware and is crucial for managing the functionality of that hardware. Regular firmware updates are essential for several reasons: they can fix bugs, enhance security, improve compatibility with other devices or software, add new features, and optimize performance. Staying up-to-date with firmware updates ensures that devices run efficiently and securely, maintaining their functionality and reliability over time.

Device as a Service (DaaS)

A subscription-based model enabling organisations to acquire and manage hardware devices, like computers, laptops, tablets, smartphones, and other technology equipment, as a comprehensive service rather than through outright purchases. In a DaaS arrangement, businesses lease or subscribe to these devices from a service provider, typically on a monthly basis. This model offers flexibility, as it allows companies to easily scale up or down according to their changing needs. DaaS also simplifies the management of IT resources, as it often includes support, maintenance, and regular upgrades, thereby reducing the burden of managing technology lifecycle and allowing businesses to focus on core operations.

Data Backup and Recovery

The process of creating copies of important files, documents, databases, or entire systems to safeguard against data loss. This precaution is essential in scenarios such as accidental deletion, hardware failure, data corruption, or other unforeseen events that could compromise data integrity. Regular data backups are a fundamental component of any robust data management and security strategy, ensuring that critical information can be recovered and restored in the event of data loss. By maintaining up-to-date backups, organisations and individuals can protect themselves against significant disruptions and ensure the continuity of their operations or personal data management.

BIOS (Basic Input/Output System)

A crucial firmware interface embedded in a computer’s motherboard, serving as the foundational set of instructions and low-level software that facilitates communication between the operating system and the computer’s hardware components during the boot process. The BIOS plays a pivotal role in initializing and configuring the system’s hardware, ensuring that all components are ready and functioning before the operating system takes over. This process includes tasks such as checking the system’s hardware integrity, setting up basic hardware configurations, and identifying bootable devices. The BIOS is essential for the smooth and efficient start-up of a computer, laying the groundwork for the operating system to control the computer’s operations.

IT Procurement

The process of acquiring and purchasing IT hardware, software, and services for an organisation. This encompasses selecting suitable vendors, negotiating terms and prices, and managing IT assets and contracts. IT procurement is a critical function that ensures an organisation has the necessary technology tools and solutions to operate effectively and meet its strategic objectives. This process involves evaluating the technical and financial aspects of potential IT investments, ensuring compliance with company policies and standards, and maintaining ongoing relationships with suppliers. Effective IT procurement contributes to optimising costs, enhancing operational efficiency, and ensuring the quality and reliability of IT resources.

Infrastructure

Hybrid Cloud Management

Hewlett Packard Enterprise have set out to solve the complexitiesof managing a hybrid cloud environment. HPE GreenLake delivers a unified management experience for hybrid environments though its intuitive management portal. By creating a layer on top of the various environments, GreenLake delivers a unified view, and control of all resources including on-premise and cloud, as well as providing key insights into usage, cost, performance and environmental impact.

With GreenLake, organisations can deploy a hybrid approach which leverages the benefits of public cloud, while minimising the risks and challenges relating to security, migration and performance.

Learn More >
HPE Financial Services (HPEFS)

The financial services division of Hewlett Packard Enterprise (HPE), a multinational information technology company. HPEFS offers a comprehensive range of financial and asset management solutions designed to assist organisations in acquiring, managing, and retiring their IT assets. These services are tailored to support businesses in optimising their investment in technology infrastructure, from facilitating the acquisition of new equipment through flexible financing options to managing the lifecycle of IT assets for maximum efficiency and value. HPEFS plays a crucial role in helping organisations navigate the financial aspects of technology management, ensuring they can access, utilise, and update their IT resources effectively and sustainably.

Networking as a Service

A cloud-based networking model that offers network services and infrastructure to organisations on a subscription basis. NaaS simplifies network management by providing a range of network functions and resources, such as routers, switches, and bandwidth, without the need for extensive in-house infrastructure. This model allows organisations to scale their network resources up or down based on demand, offering flexibility and cost-effectiveness. NaaS is particularly beneficial for businesses seeking to reduce the complexity and capital expenditure associated with traditional network management, allowing them to focus on core operations while ensuring efficient, reliable network performance.

Virtual Machine (VM)

A software-based emulation of a physical computer that enables the running of multiple virtual operating systems on a single physical machine. VMs create isolated environments, each functioning as a distinct computer, allowing for efficient resource utilisation and flexibility. They are commonly used for server consolidation, which reduces the number of physical servers required by an organisation, thus saving costs and space. Additionally, VMs are ideal for testing environments, as they can replicate different computing environments without the need for multiple physical machines. They also provide a level of isolation, which is beneficial for security and development purposes, allowing different tasks and applications to operate independently without affecting the underlying hardware.

Storage as a Service

A cloud-based model that provides scalable and on-demand storage resources to organisations. STaaS allows businesses to store and manage data without the necessity of maintaining on-premises storage infrastructure. This service model offers a flexible and cost-effective solution for data storage, enabling organisations to pay only for the storage they use and easily scale up or down as their storage needs change. STaaS also simplifies data management and accessibility, as data can be accessed from anywhere with an internet connection. It’s particularly beneficial for businesses looking to reduce capital expenditure on storage hardware and seeking the agility to adapt to fluctuating storage demands.

Private Cloud

A cloud computing environment exclusively dedicated to a single organisation. This model offers the core benefits of cloud computing, including scalability and flexibility, while also providing the added advantages of control and security associated with a private network. A private cloud is typically hosted either on-premises or at a third-party data centre, and it is not shared with other organisations. This setup allows for more customised security and compliance measures, tailored specifically to the needs of the organisation. Private clouds are particularly beneficial for businesses requiring stringent data control, enhanced security, and customised IT solutions.

Multi-Cloud

A strategy that involves using multiple cloud providers to fulfill an organisation’s computing and storage requirements. This approach provides several key advantages, such as redundancy, which enhances data safety and system reliability; flexibility in choosing and combining different cloud services; and the ability to select the most suitable services from various providers based on specific needs like cost, performance, and geographic location. Multi-cloud strategies enable organisations to avoid vendor lock-in, optimise their cloud solutions for efficiency and cost-effectiveness, and tailor their IT environments to better align with their unique operational requirements and business objectives.

Data Storage

Refers to the physical and digital systems and devices utilised for storing and managing data. This broad term includes a variety of storage solutions, ranging from traditional hard drives to more advanced solid-state drives, as well as cloud-based storage options. Data storage is a critical component of IT infrastructure, enabling the retention, retrieval, and maintenance of data essential for daily operations and long-term strategic decision-making. The choice of storage solution often depends on factors such as capacity needs, speed requirements, security considerations, and budget constraints, making data storage a key area of focus in IT planning and management.

Learn More >
Compute

Refers to the processing power and resources available in a computer or server, used primarily for data processing, calculations, and running applications. This term is a fundamental component of IT infrastructure, encompassing the capabilities of a system to execute tasks and handle workloads. Compute resources determine the efficiency and speed with which a system can process information and support various applications. The term is essential in understanding and managing IT environments, as it directly impacts the performance and scalability of technology solutions within an organisation.

Hybrid Workplace

A model that integrates in-office and remote work, offering employees the flexibility to work from various locations. This approach utilises technology extensively for communication and collaboration, adapting to the needs of a modern workforce. The hybrid workplace is increasingly relevant in contemporary work environments, accommodating diverse working styles and preferences. It fosters a balance between the benefits of physical office presence and the convenience of remote work. By leveraging digital tools and flexible policies, the hybrid workplace aims to enhance productivity, employee satisfaction, and work-life balance, reflecting the evolving dynamics of today’s professional landscape.

Data Insights

This term refers to the valuable information gleaned from data analysis, involving the identification and exploration of trends, patterns, and useful knowledge within data sets. These insights are instrumental in informing decision-making and guiding business strategies. By analysing data, organisations can gain a deeper understanding of their market, customer behaviours, operational efficiencies, and more, leading to more informed and strategic choices. Data insights enable businesses to transform raw data into actionable intelligence, playing a crucial role in driving innovation, improving customer experiences, and achieving competitive advantages in their respective industries.

Print

Managed Print Services (MPS)

Managed Print Solutions: Managed Print Services (MPS) represent a comprehensive solution designed to optimise and manage an organisation’s printing and imaging infrastructure. The primary objective of MPS is to control and reduce costs, improve efficiency, and enhance document security within the print environment. This is achieved through a thorough assessment of the current printing needs and workflows, followed by the implementation of tailored strategies to streamline operations. MPS encompasses aspects such as monitoring usage, managing supplies, maintaining equipment, and implementing sustainable printing practices. Additionally, it focuses on improving document workflow and implementing security measures to protect sensitive information. By adopting Managed Print Services, organisations can ensure a more efficient, secure, and cost-effective print environment.

Learn More >
Print Security as a Service

Print Security as a Service (PSaaS): PSaaS is a specialised service offering that concentrates on enhancing the security of an organisation’s printing and imaging infrastructure. Recognizing that print security is often an overlooked aspect of an organisation’s overall cybersecurity strategy, this managed service is tailored to address the unique security challenges inherent in printing environments. PSaaS becomes particularly crucial in settings where sensitive information is regularly printed. The service includes implementing robust security protocols and measures to protect against unauthorized access, data breaches, and other security threats within the print environment. By adopting PSaaS, organisations can ensure that their printing operations are not only efficient but also secure, safeguarding critical information and maintaining compliance with data protection standards.

Learn More >
Print Mailroom Service

Print Mailroom Service: This service is an outsourced solution designed to handle the printing and mailing needs of businesses or organisations. It streamlines and optimises the production and delivery of a wide range of printed materials, such as invoices, statements, marketing collateral, and other documents intended for distribution to customers, clients, or other recipients. By leveraging a Print Mailroom Service, organisations can significantly enhance the efficiency and effectiveness of their mailing processes. This service ensures timely and professional handling of outbound communications, reducing the internal workload and resource allocation typically associated with large-scale printing and mailing tasks. It’s an ideal solution for organisations looking to improve operational efficiency and maintain consistent, high-quality communication with their stakeholders.

Learn More >
Multifunctional Printer (MFP)

Multifunctional Printer (MFP): An MFP, commonly referred to as an All-in-One (AiO) printer, is a versatile device that amalgamates various office functions into one comprehensive machine. Going beyond the standard printing capabilities, MFPs incorporate additional features such as scanning, copying, and faxing. This multifaceted nature makes them highly efficient and space-saving solutions, suitable for both office and home environments. Designed to simplify and enhance document-related tasks, MFPs are instrumental in boosting overall productivity. Their ability to perform multiple functions reduces the need for separate devices, thereby saving space and resources while offering the convenience of handling various tasks through a single piece of equipment.

LaserJet Printer

LaserJet Printer: A LaserJet printer is a type of printer renowned for using laser technology to deliver high-quality text and graphics on paper. The term “LaserJet” is particularly associated with printers manufactured by Hewlett-Packard (HP), a leading name in the printing industry. HP’s LaserJet printers are synonymous with laser printing technology, embodying reliability, efficiency, and superior print quality. These printers work by deploying a laser beam to produce precise and sharp images and text, making them ideal for both professional and personal use, especially in scenarios where clarity and detail are paramount. Over the years, HP’s LaserJet printers have set a benchmark in the industry for their consistent performance and innovative technology.

Duty Cycle

The duty cycle denotes the recommended maximum monthly page output for a printer without encountering undue wear or performance issues. This crucial specification, furnished by printer manufacturers, aids users in comprehending the designated workload capacity of a specific printer model.

Duplex Printing

Also known as double-sided printing, this is a feature in printers that enables automatic printing on both sides of a sheet of paper. Duplex printing is an environmentally friendly option that helps in saving paper, thereby reducing printing costs and contributing to sustainability efforts. It also creates more compact documents, which is beneficial for producing professional-looking reports, booklets, and brochures. When this feature is enabled, the printer automatically flips the paper after printing on one side and then proceeds to print on the reverse side. This functionality not only optimizes resource use but also enhances convenience and efficiency in printing tasks. Duplex printing is a valuable feature for both office and personal use, supporting eco-conscious printing practices.

Duty Cycle

The duty cycle denotes the recommended maximum monthly page output for a printer without encountering undue wear or performance issues. This crucial specification, furnished by printer manufacturers, aids users in comprehending the designated workload capacity of a specific printer model.

Duplex Printing

Also known as double-sided printing, this is a feature in printers that enables automatic printing on both sides of a sheet of paper. Duplex printing is an environmentally friendly option that helps in saving paper, thereby reducing printing costs and contributing to sustainability efforts. It also creates more compact documents, which is beneficial for producing professional-looking reports, booklets, and brochures. When this feature is enabled, the printer automatically flips the paper after printing on one side and then proceeds to print on the reverse side. This functionality not only optimizes resource use but also enhances convenience and efficiency in printing tasks. Duplex printing is a valuable feature for both office and personal use, supporting eco-conscious printing practices.

Capture & Workflow

This term refers to a suite of processes and technologies focused on efficiently capturing, managing, and processing documents throughout their lifecycle. It involves the digitisation of physical documents, transforming them into electronic formats that can be easily managed and processed. Once digitised, these documents are routed through predefined workflows tailored to specific business processes. Capture & Workflow technologies automate various tasks associated with document processing, such as data extraction, categorisation, and distribution, thereby enhancing efficiency and reducing manual workload. This approach streamlines document handling, from initial capture to final archiving or disposal, ensuring that documents are processed quickly, accurately, and consistently.

Learn More >
Automatic Document Feeder (ADF)

A feature typically found in printers, scanners, and multifunction printers, designed to automate the process of scanning or copying multiple pages of a document. With an ADF, users can load a stack of pages into the feeder, and the device will automatically feed each page in sequence for scanning or copying. This eliminates the need for manual intervention for each page, significantly enhancing efficiency and convenience, especially when dealing with large documents. The ADF feature is highly valued in office environments and among professionals who frequently handle multi-page documents, as it streamlines the document handling process and saves considerable time.

Security

Endpoint Security

Endpoint Security: This term refers to the security measures focused on protecting individual devices, known as ‘endpoints’, that are connected to a network. These endpoints can include computers, laptops, smartphones, and other network-capable devices. Endpoint security is crucial in defending these devices against various cyber threats such as malware, ransomware, and unauthorised access, which can lead to data breaches. The protective measures typically encompass antivirus software, firewalls, and advanced threat detection and response systems. By securing these endpoints, organisations effectively minimise the risk of cyberattacks and data compromise, ensuring the safety and integrity of their network and sensitive information.

Learn More >
Cyber Security

Cyber Security: This term refers to the practice of protecting computer systems, networks, devices, and data from various threats, including theft, damage, and unauthorised access, as well as defending against cyberattacks. It involves a comprehensive set of technologies, processes, and practices that are specifically designed to safeguard information technology (IT) assets. Cyber security is essential in today’s digital world, where the sophistication and frequency of cyber threats are continually rising. Effective cyber security measures are crucial for preventing attacks that can compromise the confidentiality, integrity, and availability of information. These measures not only protect against data breaches and financial losses but also help in maintaining the trust and reputation of organisations in the digital landscape.

Learn More >
Malware

Malware: Short for malicious software, malware refers to any software that is intentionally designed to cause harm to a computer, server, network, or user. It encompasses a wide range of types, each with its own purpose and method of infection. The intentions behind malware vary and can include stealing sensitive information, disrupting computer operations, gaining unauthorized access to systems, or causing other types of damage. Common types of malware include viruses, worms, trojan horses, ransomware, and spyware. Understanding and protecting against malware is a critical aspect of cybersecurity, as it poses a significant threat to the integrity and security of digital systems and data.

Integrity Verification

Integrity Verification: This process is key in ensuring the authenticity, accuracy, and completeness of data or files. It typically involves the use of cryptographic techniques to detect unauthorised changes or tampering. Integrity verification is crucial in maintaining the trustworthiness of data, especially in environments where data security and integrity are paramount. This process is employed in various scenarios, ranging from securing financial transactions to verifying the integrity of software downloads, ensuring that the data or files have not been altered in an unauthorised manner.

Insider Threat

Insider Threat: In the realm of cybersecurity, an insider threat is a risk that arises from individuals within an organization who have access to its information systems, data, or network security. These individuals may include employees, contractors, or business partners, all of whom possess authorized access to the organization’s systems and data. Insider threats can stem from intentional malicious actions or unintentional security breaches. Such threats are particularly challenging to detect and manage because they originate from within the organization, often bypassing conventional security measures designed to thwart external attacks.

Firewall

Firewall: A firewall is a crucial network security device or software that oversees and regulates incoming and outgoing network traffic based on established security rules. Its primary function is to create a defensive barrier between a trusted internal network and untrusted external networks, such as the internet. This is achieved by scrutinizing data packets and determining whether they should be allowed to enter or leave the network, following a set of predefined rules. Firewalls can be hardware-based, software-based, or a combination of both, and are essential for protecting networks from unauthorized access, cyberattacks, and other security threats. By acting as a gatekeeper, firewalls play a key role in maintaining the security and integrity of an organization’s network infrastructure.

Edge Security

Edge Security: This term refers to the practice of securing devices and data located at the edge of a network, a critical area where potential vulnerabilities can arise. Edge security is particularly relevant in environments that incorporate Internet of Things (IoT) devices and edge computing infrastructure. This security approach involves implementing measures to protect against unique threats faced by these technologies, such as unauthorised access, data breaches, and other forms of cyberattacks. By focusing on securing the periphery of the network, edge security plays a crucial role in safeguarding the integrity and confidentiality of data as it is processed and transmitted in real-time, thereby reinforcing the overall cybersecurity posture of an organisation.

Data Encryption Standard (DES)

Data Encryption Standard (DES): The Data Encryption Standard (DES) is a symmetric key algorithm used for encrypting and decrypting electronic data. Recognised as one of the earliest encryption standards, DES was widely adopted for securing sensitive information and communications. Although it has been superseded by more advanced encryption technologies due to its shorter key length, DES played a pivotal role in the development of data security protocols. It laid the groundwork for modern encryption techniques, highlighting the importance of robust cryptographic methods in protecting digital information from unauthorized access and cyber threats.

Data Breach

Data Breach: A data breach occurs when there is unauthorized access, acquisition, disclosure, or loss of sensitive information held by an organization. During a data breach, confidential data, which could include personal data, financial information, intellectual property, trade secrets, and other types of confidential or proprietary data, is exposed to individuals or entities who are not authorised to access or possess it. Such incidents pose significant risks, potentially leading to financial losses, legal repercussions, and damage to the organisation’s reputation. Protecting against data breaches is a critical aspect of cybersecurity, requiring robust security measures and protocols to safeguard sensitive information from such unauthorized access or exposure.

Cloud Security

Cloud Security: This term encompasses the set of policies, technologies, and controls implemented to protect data, applications, and infrastructure within cloud computing environments. Cloud security is a vital component of utilising cloud services, particularly as organisations increasingly store and process sensitive information on third-party cloud platforms. The primary objective of cloud security is to safeguard the confidentiality, integrity, and availability of data and services hosted in the cloud. It addresses the unique challenges and risks posed by cloud computing, such as data breaches, unauthorized access, and the secure management of cloud resources. Implementing robust cloud security measures is essential for ensuring that cloud-based assets are protected against evolving cyber threats and maintaining trust in cloud computing technologies.

Blue Team

Blue Team in Cybersecurity: In the realm of cybersecurity, the term “Blue Team” designates the group responsible for the defensive aspects of security operations within an organisation. The primary role of the Blue Team is to maintain and enhance the organisation’s security posture. This involves actively defending against cyber threats, continuously monitoring for potential security incidents, and implementing robust measures to prevent and mitigate possible breaches. The Blue Team’s tasks include regular system assessments, vulnerability management, and the development of comprehensive security protocols. By focusing on defense, the Blue Team plays a crucial role in safeguarding an organisation’s digital assets and ensuring the integrity and confidentiality of its data and systems.