Ever wonder what all the technical words or services are that are mentioned daily? Well, we put together a simple explanation on multiple services and technical terms to make it easier.
What is an application program interface (API)?
An application program interface (API) is code that allows two software programs to communicate with each other and are generally released for third-party development as part of a software development kit (SDK).
What is Amazon Web Services (AWS)?
Amazon Web Services (AWS) is Amazon.com’s cloud computing platform which are sometimes called cloud services or remote computing services.
What is bring your own apps (BYOA)?
Bring your own apps (BYOA) is a term used when employees use of third-party applications and cloud services in the workplace. BYOA follows the BYOD trend allowing user-owned devices in the workplace.
What is bring your own cloud (BYOC)?
Bring your own cloud (BYOC) is when employees and departments use their cloud computing service of choice in the workplace therefore allowing employees to use a public cloud storage service to share very large files as it may be cost-effective rather than rolling out a shared storage system.
What is bring your own network (BYON)?
Bring your own network (BYON) refers to end users that create or access alternative networks when the available options. To network administrators, Bring your own network (BYON) refers is the ability of allowing employees to create personal area networks (PANs) as an alternative to the corporate network however a vendor describe the service as it allows remote employees to subscribe to a global wireless broadband network instead of connecting to insecure public hot spots.
What is bring your own identity (BYOI)?
Bring your own identity (BYOI) is a simple approach to digital authentication in which an end user’s username and password is managed by a third party. Some examples include Facebook, Twitter, LinkedIn, Google+ or Amazon.
What is bring your own encryption (BYOE)?
Bring your own encryption (BYOE) is a cloud computing security procedure that allows cloud service customers to control and use their own encryption software to manage their own encryption keys.
What is Internet of Things (IoT)?
The Internet of Things (IoT) is when objects such as people are provided with unique identifiers and the ability to transfer data over a network without human or computer interaction.
What is a virtual machine (VM)?
A virtual machine (VM) shares physical hardware resources with other systems but isolates one another to avoid changing the end-user experience.
What is a MX record (Mail Exchange record)?
An MX record is short form for Mail Exchange record which is a domain name system (DNS) server record that contains information about which mail server the domain uses to receive mail.
What is managed security services (MSS)?
Managed security services (MSS) is a systematic approach to managing an organization’s security needs which can be handled in house or outsourced to a service provider.
What is managed service provider (MSP)?
A managed service provider (MSP) or Managed IT Services provider delivers and manages network-based services, applications, and equipment for businesses or other service providers.
What is a Microsoft Certified Solution Developer (MCSD)?
A Microsoft Certified Solution Developer (MCSD) is an IT professional who has studied and passed a series of industry exams. They design and develop custom business applications using Microsoft development tools, technologies, and platform.
What is a Microsoft Certified Systems Engineer (MCSE)?
A Microsoft Certified Systems Engineer (MCSE) is an IT professional who has studied and passed a series of industry exams related desktop systems, networking, and Microsoft’s BackOffice server products.
What is a Microsoft Certified Solutions Associate (MCSA)?
A Microsoft Certified Solutions Associate (MCSA) is an industry certification program intended for IT professionals who seek an entry-level job in an IT environment and it also is a prerequisite for more advanced Microsoft certifications.
What is Malware?
Malware or malicious software is any program or file that is harmful to a computer user including computer viruses, worms, and spyware that gathers information without permission.
What is a MAC address?
A MAC (Media Access Control) address is a computer’s unique hardware number. When a system connects to the Internet from a computer, a correspondence table relates your IP address to your computer’s physical (MAC) address.
What is a virtual desktop infrastructure (VDI)?
A Virtual desktop infrastructure or VDI is the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server. Virtual desktop infrastructure (VDI) is a variation of server-based computing.
What is a service-level agreement (SLA)?
A service-level agreement (SLA) is a contract between a service provider and its clients that describes the service in measurable terms. Service-level agreement (SLA) may include a plans for addressing downtime and a policy for dealing with breaches on the part of the service provider.
What is Software as a Service (SaaS)?
Software as a Service (SaaS) is simple. It is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over the Internet.
What is an Active Directory domain?
An Active Directory (AD) domain is a collection of objects including users, groups or hardware within a Microsoft Active Directory (AD) network. Each domain holds a database containing object identity information.
What is B2B?
Business-to-business, also known as B2B, is the exchange of products, services or information between businesses, rather than between businesses and consumers (B2C).
What is B2G?
Business-to-government, also known as B2G, is the exchange of products, services or information between business to government, rather than between business-to-business (B2B) or businesses-to-consumers (B2C).
What is ITIL?
Information Technology Infrastructure Library, also known as ITIL, is a framework for IT service management that strives for predictable, maintainable services that align with the needs of the corporation or organization and the goal is to improve efficiency and achieve predictable service levels.
What is an IT director?
An IT director, also known as an information technology director, is in charge of technology within an organization and can be known as a CIO. In large enterprises, they are two separate positions where as the CIO focuses more on strategy while the IT director works directly with the technology.
What is IP spoofing?
IP spoofing or IP address forgery is the hijacking technique in which a hacker or cybercriminal masquerades as a trusted host to conceal his identity. The hijacker obtains the IP address of a legitimate host and alters packet headers so that the legitimate host appears to be the source.
What is an IP address?
An IP address or Internet Protocol is the protocol used to from one computer to another on the network or Internet. Each computer is known as a host on the Internet and has at least one IP address that identifies it from all other computers on the internet.