Appliant-Blog-1

Our Blog

All things cloud, cyber security and productivity

IT Buzzwords & Acronyms Explained

In this article we're going to explain some of the more common IT Buzzwords and Acronyms that you might hear from your current IT team/partner of read online (our blog posts for example 😉)

 

The Cloud

A type of computing that is not done locally on your desktop computer, servers, or portable devices. Typically a remote data-centre provided by a third party (Amazon AWS, Microsoft Azure) 

Public Cloud
A multi-tenant cloud computing platform delivered by a cloud service provider; makes applications, storage and other resources available to the general public over the Internet.

Private Cloud
A single-tenant, configurable cloud platform, typically maintained in-house, where hardware, storage and network resources are reserved for a single organisation.

On-Premise
A non-cloud computing environment that runs on computers on the physical location of the person or organisation using that software.

Hybrid
An approach which leverages both on-premise and cloud platforms. Alternatively, a mixture of private and public cloud platforms.

Virtualisation
Or specifically, hardware virtualisation Is the process of consolidating multiple servers, that might have been physical, onto one or more host computers. Host computers are typically server computers, capable of hosting multiple independent virtual machines simultaneously. Virtualisation can take many forms, including memory virtualisation, storage virtualisation, data virtualisation and much more.

Latency
The time it takes for electronic information to travel between two or more locations. All electrical connections experience some form of latency, from the smallest nano-circuits to the largest bandwidth data networks.

Encryption
A sophisticated algorithm that's used to encode data for privacy, security, and compliance concerns. To decode the encrypted files, a user needs the encryption key, and to crack encrypted data requires massive computer processing power.

Authentication Processes
Requirements in a network for a user to create a username and password. Multi-factor authentication is becoming more popular to reduce exposure to account compromise, by necessitating another level of authorisation via a code sent to an additional device tied to that user - for example.

 

Heard an IT buzzword or acronym that isn't covered? Comment below and we'll add it for you!

Topics: Guide, Technology

Written by Lucy Tae

Leave a Comment