Glossary List

The most comprehensive glossary of cloud computing, data center, web hosting and cybersecurity terms. Read all the terms you wonder what they mean on our constantly updated page and master the terminology.
The term you are looking for is not in the list? Email us. We will add it as soon as possible and inform you by e-mail.

Antivirus is a type of software that is capable of preventing, scanning, detecting, and deleting malware, such as worms, trojan, spyware, adware, etc. from computers. Antivirus software plays a crucial role against cyber threats for both end-users and organizations.
Apache HTTP Server is a free and open-source web server software. It is developed and maintained by an open community of developers and released under Apache License 2.0. Most Apache HTTP Server instances run on Linux distributions, but recent versions also support Microsoft Windows, OpenVMS, and Unix-like systems. Apache HTTP Server is the most used web server; it runs on approximately 65% of all web servers.
Apache Tomcat definition & meaning The Apache Tomcat software is an open-source implementation of the Java Servlet, JavaServer Pages, Java Expression Language, and Java WebSocket technologies. The Java Servlet, JavaServer Pages, Java Expression Language, and Java WebSocket specifications are developed under the Java Community Process. It aims to be a collaboration of the best-of-breed developers […]
API stands for "Application Programming Interface" which is a software intermediary that establishes the connection between two applications, enabling them to communicate via data transmission. One of the most important benefits of APIs, they allow developers to integrate new application components into the existing architecture. Thus, it simplifies application development and allows developers to save time and money.
Artificial Intelligence allows all of the software and hardware systems to be designed without any living organism, behaving just like human beings, reasoning, moving, and having many talents are called AI. Artificial intelligence, along with this definition, has a structure that can develop with the information it collects/possesses. AI technology is enhancing every day. Today it is already being used in many important daily processes.
BaaS stands for "Backend-as-a-Service" is a cloud service model allowing developers to outsource all backend aspects of application development to third parties. BaaS solutions also allow developers to focus solely on the application development process. BaaS solutions come with pre-written software that runs on servers, including database management, user authentication, push notifications, social integration, geolocation, logs, cloud storage, hosting, and remote updating.
Backup, also known as data backup, is a process that includes storing duplicated data in a secure place. The backup data is can be used to restore in case of data loss or damage. The backup data, also known as snapshots, are immutable, which means they can't be altered after being created.
Bandwidth refers to the maximum amount of data that can be transferred over a connection in a given amount of time. It is a network's communications capacity, which is the volume of information that can be sent over a connection. It can be mistaken with other network-related terms such as speed, latency, and throughput. While the bandwidth determines the amount of information transferred in a given amount of time, the speed determines how fast the information is received or sent.
Bare Metal Cloud is a non-virtualized dedicated server platform delivered with cloud-like flexibility and speed.
A bare-metal server is a physical computer server used by one tenant only. Unlike the cloud model, bare-metal servers belong to one user, also known as single-tenant physical servers. Bare metal servers allow users to optimize the server based on their needs. Bare metal servers are designed to run dedicated services; thus, stability, durability, and reliability are very important. Since the bare-metal server users don't have to share their resources with neighbors, it also offers a very predictable performance.
BI stands for "Business Intelligence" is a process that includes converting raw historical and current data into actionable insights. It uses various strategies, services, and technologies allowing organizations to make more data-driven decisions. To be able to provide this information, it combines business analytics, data mining, data visualization, data tools, performance benchmarking, descriptive analytics, and infrastructure enabling an organization to make the most accurate strategic and tactical decisions. In basic terms, business intelligence aims to evaluate and transform complex data into meaningful, actionable information.
A CDN is a system of a geographically distributed group of servers that work together to provide fast delivery of Internet content.
Cloud analytics is a type of analytics model to gather information from data, which is compiled, categorized, and available in a web browser. Cloud analytics makes it easy to perform complicated data analysis of massive data sets.
A Cloud Application or shortly a Cloud App can be any software application deployed in a cloud environment. Cloud environment covers different types of cloud computing, including public, private, hybrid cloud.
A cloud application or a cloud app deployed in a cloud environment requires some policy depending on corporate security plans and regulatory needs. It consists of a set of rules and procedures. They can vary from organization to organization.
The Cloud Computing Manifesto is a public declaration about the principles of cloud computing services such as user-friendly design, transparency, and security, scalability, sustainability, reliability for cloud computing providers and vendors.
Cloud enabler is an IT firm that provides hardware, software, storage devices, networking equipment, and other related components.
Cloud security is total protection ways of data, applications, and infrastructures on cloud computing platforms through security measures, whether it’s a public, private or hybrid cloud.
The Cloud Security Alliance (CSA) organizes comprehensive research programs and certification programs to raise awareness of best practices to help ensure a secure cloud computing environment.
Cloud services covers all delivery and service models of cloud computing. They run on remote cloud computing server rather than an on-site server. All solutions and computing services can be accessed via the internet.
A cloud service provider is a third-party company that offers services such as software, storage, databases, networking, analytics, and even infrastructure. It provides a cloud-based platform, infrastructure, application, or storage services.
Cloud Storage is a service that allows users to save data online which can be accessed and shared with those who have permission anytime and anywhere. Cloud storage can also be used as a backup solution to store backup data in a remote location.
CMOS means complementary metal-oxide-semiconductor, which is used for constructing integrated circuit chips including microprocessors, microcontrollers, memory chips, and more.
CPU means "Central Processing Unit" which is the heart of the devices that makes all of the calculations to run a system. The CPUs evolved as transistor CPUs, small-scale integration CPUs, large-scale integration CPU’s and finally today’s microprocessors.
Data center cooling is a combination of various techniques to reduce the temperature in the facility to maintain the ideal operating environment.
Data center design refers to the process of modeling and designing all resources for a data center. The design should cover IT resources, architectural layout, and infrastructure.
Data center houses critical computing resources such as server racks, routers, switches, redundant power sources, and firewalls. A data center infrastructure covers all of the physical or hardware-based components, including servers, computers, networking equipment, such as routers or switches, security, and storage equipment, and data center management software, as well as non-computing resources.
Data Center Infrastructure Management (DCIM) can be defined as the administration of cooling, power and server capacity in a data center. DCIM software covers both IT equipment and supporting infrastructure such as power and cooling systems. Main goal of a DCIM software is to help prevent equipment problems that lead to downtime.
Data center management covers the administration of all parts of a data center, including cooling, power, server capacity, and staff.  Its primary function is to operate a data center without redundancy.
Data Center Infrastructure Management (DCIM) software covers both IT equipment and supporting infrastructures such as power and cooling systems. Compared to DCIM software, data center management software provides additional information on network management, compute infrastructure, storage and applications management, reporting, and alerting capabilities.
The data center that houses critical computing resources needs monitoring to check whether the data center operates correctly. There are several interdependent components to monitor in a data center.
A data center rack is a framework that is designed to house servers and other data center computing equipment. Data center racks are an essential part of a data center to keep everything nicely organized. A data center rack's structure allows placing data center equipments, networking devices, and cables easily. Racks are mainly designed to host components such as networking equipment, telecommunication equipment, cooling systems, and UPS.
Keeping a data center secure is critical. With physical practices and virtualtechnologies, a data center must be protected from external and internal attacks. Data center security is also essential for providing processing, storage, andconnectivity services without interruption.
Datacenter services cover all services and facility-related components that provide data backup and recovery, networking, website hosting, and data management.
Data center storage refers to all the tools, technologies, devices, and processes to design, implement, manage and monitor storage infrastructure and resources within a data center.
There are multiple roles to run a data center, including the maintenance of all the equipment and systems in the data center, housekeeping, training, and capacity management for space power and cooling. Among multiple roles, a data center technician plays a vital role.
Data center tiers are used for explaining specific kinds of data center depending on specific features. Tier certification proves some features of a data center such as respect, guidance, risk avoidance, higher efficiency.
In short, DDoS mitigation is the process of protecting a server from an attack. If done successfully, mitigation can keep the website working properly during an attack.
Disaster Recovery as a Service, or DRaaS for short, is a service model to protect and backup data in the cloud computing environment against disasters.
FIPS 140-2 is a computer security standard that specifies the requirements for cryptographic modules including both hardware and software components.
GNOME is an open-source desktop environment for operating systems.
GPU is originally stood for graphics processor unit. GPU is a specialized electronic circuit, which is designed for manipulating computer graphics and image processing.
A hybrid cloud is an IT architecture that combines a private cloud with at least one public cloud. In hybrid cloud solutions, data and applications are shared between these private and public clouds. Hybrid cloud offers a single, unified, and flexible distributed computing environment, allowing organizations to combine cloud services and functionalities from different cloud vendors. It also enables organizations to move workloads between public and private cloud or choose the ideal cloud computing service for each workload.
Infrastructure-as-a-Service (IaaS) is a cloud computing offering that provides compute, network, and storage solutions to customers. Most IaaS providers offer a pay-as-you-go pricing model for customers, which also enables them to scale the service through the application programming interface or dashboard to suit their needs whenever they want.
IPv4 is the fourth version of IP. IP is the short name of Internet Protocol. IPv4 was introduced in 1982 by the Internet Engineering Task Force (IETF). It is a standard, which routes Internet traffic and other packet-switched networks.
KDE is one of the most popular free and open-source desktop environments for the Linux universe. KDE developers have focused on user interface design for the latest years, and they brought the Linux users KDE Plasma, the fifth generation of KDE.
Linux is a kernel originally developed by Linus Torvalds for hobby purposes. Later, with his famous message to the newsgroup, it became the operating system of today. The understanding of the development, use, distribution, and sharing of software products independent of individuals, institutions, and organizations has created the concept of free software. The first thing that comes to mind in this context is the GNU/Linux operating system developed by Linus Torvalds from the beginning and supported by a large number of volunteer programmers communicating over the Internet.
A load balancer, also known as a server farm or a server pool, is a networking solution that distributes the workload across multiple servers in a server farm. In other words, it divides the network traffic among the servers in a system. It can be deployed as software or hardware. By distributing the connections from clients to servers, it acts as a front-end to servers.
Malware, short for “malicious software", is an umbrella term that includes viruses, worms, Trojan viruses, spyware, adware, and ransomware. Malware is software created by cybercriminals with an aim to steal data and damage, invade, or destroy computers and computer systems.
ModSecurity, also known as ModSec, is an open-source web application firewall (WAF).
Multi-cloud is defined as the use of multiple cloud computing and storage services in a single network architecture.
Network infrastructure is a system that includes hardware and software allowing users, services, applications, and processes to communicate with each other. It is considered as a part of the IT infrastructure in enterprise IT environments. Network infrastructure can be used for both internal and external communications.
NVMe, or non-volatile memory express, is a storage access and transport protocol for using PCIe-based solid-state drives. It is designed for PCIe SSDs to offer efficient, scalable, and manageable performance, which is ideal for enterprise workloads.
On-premise, also known as on-prem, refers to hardware infrastructure and software are deployed and running within the physical location of the organization.
Open source means the source code which can be freely accessible for modification and redistribution. Open source is mostly referred to a software. Most of the open source software is also licensed with an open source license such as MIT, GPL, Apache, BSD etc.
PaaS stands for "Platform as a Service", which provides the developers a complete cloud platform to develop, run, and manage applications without dealing with any additional cost, building, and maintaining the underlying infrastructure. PaaS is a form of cloud computing, which offers an infrastructure for cloud-based applications.
A PHP Framework is a basic platform that allows us to develop web applications using PHP.
PowerShell is a cross-platform open-source command-line shell, also considered as a framework, and a scripting language developed by Microsoft.
Private cloud is a cloud computing model that provides the infrastructure dedicated to a single customer. In a private cloud, all hardware and software resources are dedicated to and accessible by a single customer.
Public cloud is a cloud computing service that includes computing services and infrastructure that are managed and provided by the vendor. Public cloud means that the service is offered to multiple customers, unlike private cloud. Public cloud includes PaaS, SaaS, and IaaS solutions. Public cloud services run on remote servers and customers access the service over the internet.
Ransomware is a special type of malware that focuses on stealing or encrypting the data on a system then demands a ransom fee before the deadline. Ransomware attacks can both target end-users and big organizations. If the victim doesn't agree to pay the ransom, the data can be published or deleted forever. Ransomware is a rising trend recently and very common nowadays and among one of the most feared cyber threats by big organizations.
The RPM Package Manager (RPM) refers to a powerful software package management system. While building computer software from the source into easily distributable packages, RPM installs, updates, and uninstalls packaged software.
SaaS stands for "Software as a Service", which is a software deployment model that allows users to use applications via the internet instead of installing them in a cloud computing platform. These applications can also be called web-based, on-demand, or hosted software. In the SaaS delivery model, which is a cloud-based service, the vendor handles all the technical issues. As users and businesses adopt SaaS solutions, it has become more popular in recent years.
Search engine optimization (SEO) is a critical component in the success of your website. Most website owners focus on Google search engine ranking, but Bing has a strong presence in the market as well. Both search engines aim to provide relevant and safe results for their users.
Secure Socket Layers (SSL) is a protocol that provides security measures during the communication over a computer network between the client and the server.
TLS stands for "Transport Layer Security", which is an evolution of Secure Sockets Layer (SSL) which allows devices on the internet to communicate safely. The latest version of the TLS protocol provides unparalleled privacy and performance compared to older versions. The new version of the handshake in TLS 1.3 also brings performance improvements by reducing latency.
Unix-like operating systems identify a user by a value called a user identifier (UID) and Identify group by a group identifier (GID), are used to determine which system resources a user or group can access.
Uptime Institute’s Tier Standard is one of the globally most recognized standards for data center reliability and overall performance.
A Virtual Private Network, or VPN for short, is an encrypted connection made via the internet from a device to a network. Millions of internet users are using VPN solutions to protect their privacy against possible online threats. VPN protects the data by encrypting the connection during the transmission and to prevent third parties from eavesdropping. VPN is also popular in corporate environments.
Wi-Fi can be defined as the abbreviation of wireless connection. Wi-Fi is the wireless technology used to connect computers, tablets, smartphones and IoT devices to the internet.
WooCommerce is an open-source eCommerce platform built on the popular content management system, WordPress. WooCommerce is a WordPress plugin, thus it requires WordPress to install. WooCommerce allows users to create their online store easily. Both WordPress and WooCommerce are free and open-source solutions.
WordPress is an open-source content management system written in the PHP programming language. In the beginning, it was supporting only the English language. But in time, with the help of volunteer translators from all over the world, it is now can be used in almost any modern language. WordPress was developed as a blogging system. After a short period of time, it became a rich-featured CMS. Now it can also be used as an e-commerce platform.
Zero-day is an umbrella term that can refer to a zero-day vulnerability, a zero-day exploit, or a zero-day attack. Zero-day vulnerability means the developer has just noticed the vulnerability or the flaw. It is called zero-day because the developer had "zero days" to be able to patch it.