Glossary List

The most comprehensive glossary of cloud computing, data center, web hosting and cybersecurity terms. Read all the terms you wonder what they mean on our constantly updated page and master the terminology.
The term you are looking for is not in the list? Email us. We will add it as soon as possible and inform you by e-mail.

AaaS stands for "Analytics-as-a-Service" is a cloud offering that provides access to data analysis tools over the internet. As the amount of data is getting bigger every day, it became a harder challenge to gather meaningful information from it. AaaS allows organizations of every size to gather the information they need from the data they have collected.
Antivirus is a type of software that is capable of preventing, scanning, detecting, and deleting malware, such as worms, trojan, spyware, adware, etc. from computers. Antivirus software plays a crucial role against cyber threats for both end-users and organizations.
Apache HTTP Server is a free and open-source web server software. It is developed and maintained by an open community of developers and released under Apache License 2.0. Most Apache HTTP Server instances run on Linux distributions, but recent versions also support Microsoft Windows, OpenVMS, and Unix-like systems. Apache HTTP Server is the most used web server; it runs on approximately 65% of all web servers.
The Apache Tomcat software is an open-source implementation of the Java Servlet, JavaServer Pages, Java Expression Language, and Java WebSocket technologies. The Java Servlet, JavaServer Pages, Java Expression Language, and Java WebSocket specifications are developed under the Java Community Process. It aims to be a collaboration of the best-of-breed developers from around the world.
API stands for "Application Programming Interface" which is a software intermediary that establishes the connection between two applications, enabling them to communicate via data transmission. One of the most important benefits of APIs, they allow developers to integrate new application components into the existing architecture. Thus, it simplifies application development and allows developers to save time and money.
Artificial Intelligence allows all of the software and hardware systems to be designed without any living organism, behaving just like human beings, reasoning, moving, and having many talents are called AI. Artificial intelligence, along with this definition, has a structure that can develop with the information it collects/possesses. AI technology is enhancing every day. Today it is already being used in many important daily processes.
ASP.NET, which is very confused with ASP, is a much more advanced technology whose code is written in common language runtime, unlike ASP. ASP.NET is a framework where web applications are created.
BaaS stands for "Backend-as-a-Service" is a cloud service model allowing developers to outsource all backend aspects of application development to third parties. BaaS solutions also allow developers to focus solely on the application development process. BaaS solutions come with pre-written software that runs on servers, including database management, user authentication, push notifications, social integration, geolocation, logs, cloud storage, hosting, and remote updating.
Backup, also known as data backup, is a process that includes storing duplicated data in a secure place. The backup data is can be used to restore in case of data loss or damage. The backup data, also known as snapshots, are immutable, which means they can't be altered after being created.
Bandwidth refers to the maximum amount of data that can be transferred over a connection in a given amount of time. It is a network's communications capacity, which is the volume of information that can be sent over a connection. It can be mistaken with other network-related terms such as speed, latency, and throughput. While the bandwidth determines the amount of information transferred in a given amount of time, the speed determines how fast the information is received or sent.
Bare Metal Cloud is a non-virtualized dedicated server platform delivered with cloud-like flexibility and speed.
A bare-metal server is a physical computer server used by one tenant only. Unlike the cloud model, bare-metal servers belong to one user, also known as single-tenant physical servers. Bare metal servers allow users to optimize the server based on their needs.
Big Data refers to large volumes of structured and unstructured data, which is hard to manage. Big Data is so large, that it is beyond the traditional data management tools' capabilities to process it efficiently. The challenge can be caused by the data's size, complexity, or speed. All of these factors make it impossible to process the data with the traditional methods.
The BIOS firmware is the most basic software for PCs. It initiates and tests the hardware on the system, then loads a boot loader from the storage device to load and run the installed operating system. BIOS is the acronym for Basic Input/Output System, which originates from CP/M operating system that was used in the late 70s. BIOS was originally proprietary of IBM PC; then some other companies reverse engineered it.
BI stands for "Business Intelligence" is a process that includes converting raw historical and current data into actionable insights. It uses various strategies, services, and technologies allowing organizations to make more data-driven decisions. To be able to provide this information, it combines business analytics, data mining, data visualization, data tools, performance benchmarking, descriptive analytics, and infrastructure enabling an organization to make the most accurate strategic and tactical decisions. In basic terms, business intelligence aims to evaluate and transform complex data into meaningful, actionable information.
CaaS stands for "Containers-as-a-Service" is a cloud service model that enables users to manage and deploy apps and clusters through container-based virtualization. It can be deployed on-premises or in the cloud. In CaaS, the service provider provides the framework or the orchestration platform, and the customer deploys and manages containers on it.
CDN, stands for "Content Delivery Network", refers to a group of servers capable of working together. These servers are distributed geographically to be able to deliver the content faster online around the world. A CDN doesn't host the content, instead, it helps cache content at the network edge, improving the website performance in the different regions.
CEO stands for "Chief Executive Officer". CEO is the highest-ranking person in a company's hierarchy. They may differ in responsibilities but are the key decision-makers in a company. Most chief executive officers also become the public face of the company. CEOs work with other C-level executives and managers during the top-level managerial decision-making process. CEOs are the ultimate authority in making the final decisions.
CFO stands for the chief financial officer, who is a c-level executive. CFOs are responsible for managing the financial actions of the organization. Similar to other c-level positions, CFO is one of the highest positions in a company anyone can achieve. It is the highest financial position in an organization. The position was defined by large organizations, however nowadays medium and even small-sized organizations are looking for CFOs.
Cloud analytics is a type of analytics model to gather information from data, which is compiled, categorized, and available in a web browser. Cloud analytics makes it easy to perform complicated data analysis of massive data sets.
A Cloud Application or shortly a Cloud App can be any software application deployed in a cloud environment. Cloud environment covers different types of cloud computing, including public, private, hybrid cloud.
A cloud application or a cloud app deployed in a cloud environment requires some policy depending on corporate security plans and regulatory needs. It consists of a set of rules and procedures. They can vary from organization to organization.
The Cloud Computing Manifesto is a public declaration about the principles of cloud computing services such as user-friendly design, transparency, and security, scalability, sustainability, reliability for cloud computing providers and vendors.
Cloud enabler is an IT firm that provides hardware, software, storage devices, networking equipment, and other related components.
Cloud security is total protection ways of data, applications, and infrastructures on cloud computing platforms through security measures, whether it’s a public, private or hybrid cloud.
The Cloud Security Alliance (CSA) organizes comprehensive research programs and certification programs to raise awareness of best practices to help ensure a secure cloud computing environment.
Cloud services covers all delivery and service models of cloud computing. They run on remote cloud computing server rather than an on-site server. All solutions and computing services can be accessed via the internet.
A cloud service provider is a third-party company that offers services such as software, storage, databases, networking, analytics, and even infrastructure. It provides a cloud-based platform, infrastructure, application, or storage services.
Cloud Storage is a service that allows users to save data online which can be accessed and shared with those who have permission anytime and anywhere. Cloud storage can also be used as a backup solution to store backup data in a remote location.
CMO stands for "Chief Marketing Officer", who is responsible for overseeing an organization's marketing activities. It can be referred to as a marketing director or global marketing officer. CMO is the highest possible position related to marketing in an organization. A CMO's duties and priorities can depend on the organization's needs but in most cases, a CMO should work closely with other C-level executives to help the organization reach its goals.
CMOS means complementary metal-oxide-semiconductor, which is used for constructing integrated circuit chips including microprocessors, microcontrollers, memory chips, and more.
COO stands for the chief operating officer, who is responsible for overseeing the administrative and operational functions of an organization. It can also be referred to as executive vice president of operations, chief operations officer, or operations director. While the CEO focuses on the organization's outward-facing communication, the COO handles the internal affairs.
CPU means "Central Processing Unit" which is the heart of the devices that makes all of the calculations to run a system. The CPUs evolved as transistor CPUs, small-scale integration CPUs, large-scale integration CPU’s and finally today’s microprocessors.
CSO stands for "Chief Security Officer", which is an executive position that is responsible for overseeing the company's employees', assets', and information security. A CSO's main responsibility is to lead the team to protect the organization against any kind of digital threats. CSOs not only decide the security tools that will be implemented but also directs the organization's infosec team to educate the employees to protect the organization's network and intellectual property.
CTO stands for "Chief Technology Officer" is an executive who is responsible for managing an organization's technical tasks along with research and development. A CTO should be capable of examining an organization's short and long-term needs and making investments to help the organization achieve its goals.
DaaS stands for "Desktop-as-a-Service", a cloud computing offering that provides virtual desktops to end-users. Users can access these virtual desktops over the internet and are mostly provided with a per-user payment method. End-users can access these virtual desktops from anywhere, anytime, with the device they prefer and an internet connection.
Data center cooling is a combination of various techniques to reduce the temperature in the facility to maintain the ideal operating environment.
Data center design refers to the process of modeling and designing all resources for a data center. The design should cover IT resources, architectural layout, and infrastructure.
Data center houses critical computing resources such as server racks, routers, switches, redundant power sources, and firewalls. A data center infrastructure covers all of the physical or hardware-based components, including servers, computers, networking equipment, such as routers or switches, security, and storage equipment, and data center management software, as well as non-computing resources.
Data Center Infrastructure Management (DCIM) can be defined as the administration of cooling, power and server capacity in a data center. DCIM software covers both IT equipment and supporting infrastructure such as power and cooling systems. Main goal of a DCIM software is to help prevent equipment problems that lead to downtime.
Data center management covers the administration of all parts of a data center, including cooling, power, server capacity, and staff.  Its primary function is to operate a data center without redundancy.
Data Center Infrastructure Management (DCIM) software covers both IT equipment and supporting infrastructures such as power and cooling systems. Compared to DCIM software, data center management software provides additional information on network management, compute infrastructure, storage and applications management, reporting, and alerting capabilities.
The data center that houses critical computing resources needs monitoring to check whether the data center operates correctly. There are several interdependent components to monitor in a data center.
A data center rack is a framework that is designed to house servers and other data center computing equipment. Data center racks are an essential part of a data center to keep everything nicely organized. A data center rack's structure allows placing data center equipments, networking devices, and cables easily. Racks are mainly designed to host components such as networking equipment, telecommunication equipment, cooling systems, and UPS.
Keeping a data center secure is critical. With physical practices and virtualtechnologies, a data center must be protected from external and internal attacks. Data center security is also essential for providing processing, storage, andconnectivity services without interruption.
Datacenter services cover all services and facility-related components that provide data backup and recovery, networking, website hosting, and data management.
Data center storage refers to all the tools, technologies, devices, and processes to design, implement, manage and monitor storage infrastructure and resources within a data center.
There are multiple roles to run a data center, including the maintenance of all the equipment and systems in the data center, housekeeping, training, and capacity management for space power and cooling. Among multiple roles, a data center technician plays a vital role.
Data center tiers are used for explaining specific kinds of data center depending on specific features. Tier certification proves some features of a data center such as respect, guidance, risk avoidance, higher efficiency.
DBaaS stands for "Database-as-a-Service". DBaaS is a cloud computing offering that provides customers access to a database without setting up or configuring physical hardware or software. DBaaS solution providers handle the maintenance and administrative tasks for the customers, allowing them to focus elsewhere. DBaaS comes with a subscription model that includes everything related to operating a database in the cloud, such as database provisioning, licenses, support, and maintenance. Some providers also offer usage-based pricing models. DBaaS is a viral category of Software-as-a-Service among IT organizations, developers, and DevOps.
DDoS stands for "Distributed Denial of Service" attack which is aimed at a target, preventing the system from serving and preventing users from accessing the system. Each system has a volume of network traffic than it can handle. When these resources of the system are overloaded by attackers, system services slow down and even the services provided by the system collapse completely as a result of these attacks.
In short, DDoS mitigation is the process of protecting a server from an attack. If done successfully, mitigation can keep the website working properly during an attack.
A desktop environment is a package of software that translates kernel commands into a user-friendly visual interface. Window managers, toolbars, desktop widgets, icons, and more are included in this package. A desktop environment combines the look and the user experience of an operating system. Its scope stands somewhere between a simple theme and the kernel itself. "Desktop environment" has a much wider scope than a theme but is also way narrower than the operating systems' kernel.
Disaster Recovery as a Service, or DRaaS for short, is a service model to protect and backup data in the cloud computing environment against disasters.
FaaS stands for "Function-as-a-Service" is a cloud computing service that uses serverless computing technologies and architectures. It aims to make developers deploy applications in the cloud by eliminating the necessity to manage servers. With FaaS, developers can build, compute, run, and manage application packages as functions without maintaining the infrastructure.
FIPS 140-2 is a computer security standard that specifies the requirements for cryptographic modules including both hardware and software components.
GNOME is an open-source desktop environment for operating systems.
GPU is originally stood for graphics processor unit. GPU is a specialized electronic circuit, which is designed for manipulating computer graphics and image processing.
Headless CMS is a content management system that provides the content as data by using an API. Although it is not a new technology, it is gaining significant popularity in recent years. Also, headless CMSs are improving to be more flexible to meet the users' needs. Headless CMS is the back-end of a CMS that is being used as a content repository without a connected frond-end or display layer. Headless CMS stores all the contents and assets and uses an API to distribute that to wherever it is needed. Headless CMS is also known as Content Database, Content Backend, Content Repository, or Content API.
HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files, such as text, graphic images, sound, video, and other multimedia files, on the World Wide Web. Designed in the early 1990s, HTTP is defined as a client-server protocol, which means requests are initiated by the recipient, usually the Web browser.
A hybrid cloud is an IT architecture that combines a private cloud with at least one public cloud. In hybrid cloud solutions, data and applications are shared between these private and public clouds. Hybrid cloud offers a single, unified, and flexible distributed computing environment, allowing organizations to combine cloud services and functionalities from different cloud vendors. It also enables organizations to move workloads between public and private cloud or choose the ideal cloud computing service for each workload.
IaaS stands for “Infrastructure as a Service” is a cloud computing offering that provides compute, network, and storage solutions to customers. Most IaaS providers offer a pay-as-you-go pricing model for customers, which also enables them to scale the service through the application programming interface or dashboard to suit their needs whenever they want.
IPv4 is the fourth version of IP. IP is the short name of Internet Protocol. IPv4 was introduced in 1982 by the Internet Engineering Task Force (IETF). It is a standard, which routes Internet traffic and other packet-switched networks.
ISP stands for "Internet Service Provider", which is a company that provides services for accessing, using, or participating in the Internet for both individuals and organizations. ISPs can also provide additional services, such as email services, domain registration, internet transit, and web hosting. Every device that is capable of connecting to the Internet needs an ISP for an active Internet connection. Some ISPs are bundling their solutions with other offers, such as cable tv to attract more customers.
KDE is one of the most popular free and open-source desktop environments for the Linux universe. KDE developers have focused on user interface design for the latest years, and they brought the Linux users KDE Plasma, the fifth generation of KDE.
Linux is a kernel originally developed by Linus Torvalds for hobby purposes. Later, with his famous message to the newsgroup, it became the operating system of today. The understanding of the development, use, distribution, and sharing of software products independent of individuals, institutions, and organizations has created the concept of free software. The first thing that comes to mind in this context is the GNU/Linux operating system developed by Linus Torvalds from the beginning and supported by a large number of volunteer programmers communicating over the Internet.
Linux kernel is the core of the Linux-based operating systems. It is the core interface that handles the communication between the processes and the hardware. It is a bridge between the two, managing the resources as efficiently as possible. Linux kernel is a free, open-source, modular, monolithic, Unix-like operating system kernel. It can be inspected, modified, forked, and distributed by anyone without any copyright issues.
A load balancer, also known as a server farm or a server pool, is a networking solution that distributes the workload across multiple servers in a server farm. In other words, it divides the network traffic among the servers in a system. It can be deployed as software or hardware. By distributing the connections from clients to servers, it acts as a front-end to servers.
Malware, short for “malicious software", is an umbrella term that includes viruses, worms, Trojan viruses, spyware, adware, and ransomware. Malware is software created by cybercriminals with an aim to steal data and damage, invade, or destroy computers and computer systems.
ModSecurity, also known as ModSec, is an open-source web application firewall (WAF).
Multi-cloud is a deployment model that uses several instances of cloud solutions from different vendors. It allows organizations to benefit from various cloud services from different vendors. Multi-cloud deployments can include multiple IaaS, PaaS, and SaaS solutions from different vendors. Most organizations are using open-source and cloud-native technologies for their multi-cloud solutions.
Network infrastructure is a system that includes hardware and software allowing users, services, applications, and processes to communicate with each other. It is considered as a part of the IT infrastructure in enterprise IT environments. Network infrastructure can be used for both internal and external communications.
NVMe, or non-volatile memory express, is a storage access and transport protocol for using PCIe-based solid-state drives. It is designed for PCIe SSDs to offer efficient, scalable, and manageable performance, which is ideal for enterprise workloads.
On-premise, also known as on-prem, refers to hardware infrastructure and software are deployed and running within the physical location of the organization. In on-premise systems, the data stays in the organization’s private network, thus the organization has complete control over the infrastructure. On-premise software requires the server and the end-user to have a license to be able to use the software.
Open source means the source code which can be freely accessible for modification and redistribution. Open source is mostly referred to a software. Most of the open source software is also licensed with an open source license such as MIT, GPL, Apache, BSD etc.
PaaS stands for "Platform as a Service", which provides the developers a complete cloud platform to develop, run, and manage applications without dealing with any additional cost, building, and maintaining the underlying infrastructure. PaaS is a form of cloud computing, which offers an infrastructure for cloud-based applications.
A phishing attack is a method of social engineering in which the attacker tries to contact the victim with counterfeit communications that look like coming from a legitimate source. The message aims to trick the victim to interact with a website that can steal login information, install malware, or steal sensitive information.
A PHP Framework is a basic platform that allows us to develop web applications using PHP.
PowerShell is a cross-platform open-source command-line shell, also considered as a framework, and a scripting language developed by Microsoft.
Private Cloud, also known as an Internal Cloud or Corporate Cloud, is a cloud computing environment that combines the benefits of cloud computing, such as elasticity, scalability, and ease of service, with the advantages of the on-premise infrastructure, including access control, security, and resource customization. In a private cloud, all the hardware resources and software are completely dedicated to a single customer.
Public cloud is a cloud computing service that includes computing services and infrastructure that are managed and provided by the vendor. Public cloud means that the service is offered to multiple customers, unlike private cloud. Public cloud includes PaaS, SaaS, and IaaS solutions. Public cloud services run on remote servers and customers access the service over the internet.
RaaS, which stands for Ransomware as a Service, is a business model in which affiliates pay ransomware operators to launch attacks on targets. It can be considered as a type of software as a service model. Anyone who paid for RaaS services can launch an attack on the target they prefer without any technical skill or knowledge. Ransomware operators provide RaaS kits to affiliates allowing them to use the service. Also, similar to other legitimate solutions, operators provide a panel to create their ransomware package and command and control dashboard to affiliates.
Ransomware is a special type of malware that focuses on stealing or encrypting the data on a system then demands a ransom fee before the deadline. Ransomware attacks can both target end-users and big organizations. If the victim doesn't agree to pay the ransom, the data can be published or deleted forever. Ransomware is a rising trend recently and very common nowadays and among one of the most feared cyber threats by big organizations.
The RPM Package Manager (RPM) refers to a powerful software package management system. While building computer software from the source into easily distributable packages, RPM installs, updates, and uninstalls packaged software.
SaaS stands for "Software as a Service", which is a software deployment model that allows users to use applications via the internet instead of installing them in a cloud computing platform. These applications can also be called web-based, on-demand, or hosted software. In the SaaS delivery model, which is a cloud-based service, the vendor handles all the technical issues. As users and businesses adopt SaaS solutions, it has become more popular in recent years.
SECaaS, also known as "Security as a Service", is a cloud-based method that offers security technologies. SECaaS providers help organizations to protect themselves against various online threats. It allows organizations to outsource their cybersecurity, which can include data protection, VoIP security, database security, and general network security. SECaaS solutions are gaining popularity recently among corporations with scalability and cost-savings benefits. In SECaaS solutions, the provider is responsible for the management of security services.
Search engine optimization (SEO) is a critical component in the success of your website. Most website owners focus on Google search engine ranking, but Bing has a strong presence in the market as well. Both search engines aim to provide relevant and safe results for their users.
Serverless computing is a cloud-based execution model that allows creating and managing applications by eliminating the need to manage servers. It enables developers to focus on the front end. In the serverless model, the back-end is completely handled by the vendor. In serverless computing, the cloud service providers manage the servers and provision on-demand machine resources.
Secure Socket Layers (SSL) is a protocol that provides security measures during the communication over a computer network between the client and the server.
STaaS stands for "Storage-as-a-Service", which is a cloud computing managed service model. In STaaS, the provider rents storage resources to users with subscription-based payment methods. The service eliminates the upfront cost of creating an on-premise storage solution for organizations. STaaS allows users to pay for the storage they need and when they need it. Some other services, such as Database-as-a-Service, are built on top of STaaS solutions.
TLS stands for "Transport Layer Security", which is an evolution of Secure Sockets Layer (SSL) which allows devices on the internet to communicate safely. The latest version of the TLS protocol provides unparalleled privacy and performance compared to older versions. The new version of the handshake in TLS 1.3 also brings performance improvements by reducing latency.
UEFI is the acronym for "Unified Extensible Firmware Interface" that takes the place of BIOS (Basic Input/Output System) on PCs. Its main purpose is to do what BIOS does and improve them with additional features and extend already-existing capabilities. BIOS is the most basic firmware that initiates all the hardware on the system and boots the operating system. Since it was quite a primitive firmware, hardware companies made their way for a more capable firmware standard that provides a wider array of options: UEFI.
Unix-like operating systems identify a user by a value called a user identifier (UID) and Identify group by a group identifier (GID), are used to determine which system resources a user or group can access.
Uptime Institute’s Tier Standard is one of the globally most recognized standards for data center reliability and overall performance.
A Virtual Private Network, or VPN for short, is an encrypted connection made via the internet from a device to a network. Millions of internet users are using VPN solutions to protect their privacy against possible online threats. VPN protects the data by encrypting the connection during the transmission and to prevent third parties from eavesdropping. VPN is also popular in corporate environments.
Currently, the popular web browsers in the market are Chrome, Firefox, Safari, Opera, Edge, and Brave. To explain the main function of the browser simply, we can say that it establishes a connection to the servers connected to the Internet with the help of Hyper-Text Transfer Protocol (HTTP) and allows the user to view the content. These contents can be HTML files, CSS files, PDF files, Pictures, videos, or other content.
Wi-Fi can be defined as the abbreviation of wireless connection. Wi-Fi is the wireless technology used to connect computers, tablets, smartphones and IoT devices to the internet.
WooCommerce is an open-source eCommerce platform built on the popular content management system, WordPress. WooCommerce is a WordPress plugin, thus it requires WordPress to install. WooCommerce allows users to create their online store easily. Both WordPress and WooCommerce are free and open-source solutions.
WordPress is an open-source content management system written in the PHP programming language. In the beginning, it was supporting only the English language. But in time, with the help of volunteer translators from all over the world, it is now can be used in almost any modern language. WordPress was developed as a blogging system. After a short period of time, it became a rich-featured CMS. Now it can also be used as an e-commerce platform.
Zero-day is an umbrella term that can refer to a zero-day vulnerability, a zero-day exploit, or a zero-day attack. Zero-day vulnerability means the developer has just noticed the vulnerability or the flaw. It is called zero-day because the developer had "zero days" to be able to patch it.

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.

Retrieve your password

Please enter your username or email address to reset your password.