IT Glossary - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Automated Reasoning

Automated Reasoning is the area of computer science that is concerned with applying reasoning in the form of logic and mathematics by computers, enabling the solving of complex problems and proving theorems automatically.

You will find this term commonly used in AI, Computer Science

Automated Software Testing

Automated Software Testing involves using software tools to run tests on the software being developed automatically, without manual intervention, to improve efficiency and coverage of the test process.

You will find this term commonly used in Software Development, QA

Automated Software Testing Framework

A set of guidelines, tools, and practices for automating the process of software testing, aiming to reduce manual testing efforts, improve accuracy and consistency, and speed up the testing process.

You will find this term commonly used in Software Testing, DevOps

Automated System Recovery

A feature or process that automatically restores a system to a previous state or configuration after a failure or crash, minimizing downtime and data loss.

You will find this term commonly used in IT Operations, Disaster Recovery

Automated Threat Intelligence

The use of software tools and algorithms to collect, analyze, and manage data about potential security threats, helping organizations to proactively defend against cyber attacks.

You will find this term commonly used in Cybersecurity, Threat Intelligence

Autonomous Control Systems

Systems capable of operating independently of human control, often using AI and machine learning to make decisions and perform tasks based on environmental inputs.

You will find this term commonly used in Robotics, AI

Autonomous Data Platforms

Data management platforms that use AI and machine learning to automate data curation, integration, optimization, and governance, aiming to reduce manual data management tasks and improve data quality and accessibility.

You will find this term commonly used in Data Management, AI

Autonomous Database

An Autonomous Database is a cloud database that uses machine learning to automate database tuning, security, backups, updates, and other routine management tasks, significantly reducing the need for manual database administration.

You will find this term commonly used in Cloud Computing, Databases

Autonomous Decision-Making Systems

Systems capable of making independent decisions based on data analysis and predefined criteria without human intervention, often used in contexts such as autonomous vehicles, trading systems, and smart grid management.

You will find this term commonly used in AI, Decision Support Systems

Autonomous IT Operations

The use of artificial intelligence and machine learning technologies to automate the monitoring, management, and maintenance of IT infrastructure and operations, aiming to improve efficiency, reduce downtime, and predict issues before they impact services.

You will find this term commonly used in IT Management, AI

Autonomous Networking

Autonomous Networking refers to the use of AI and machine learning in network management, allowing networks to automatically configure, optimize, and repair themselves without human intervention.

You will find this term commonly used in Networking, AI

Autonomous Robotic Systems

Robots that can perform desired tasks in unstructured environments without continuous human guidance.

You will find this term commonly used in Robotics, AI

Autonomous System (AS)

An Autonomous System is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators that presents a common, clearly defined routing policy to the Internet.

You will find this term commonly used in Networking

Autonomous Systems (AS)

An Autonomous System (AS) is a collection of connected IP routing prefixes under the control of one or more network operators that presents a common routing policy to the internet, crucial for the global routing system.

You will find this term commonly used in Networking, Internet Technology

Availability

In IT, availability refers to the degree to which a system, component, or service is operational and accessible when required for use, often considered a critical component of system reliability.

You will find this term commonly used in General IT, Security

Availability Management

Availability Management is an IT service management process focused on ensuring IT services are available as agreed upon in service level agreements (SLAs), addressing the reliability and maintainability of IT services.

You will find this term commonly used in IT Management, IT Service Management

AWS (Amazon Web Services)

AWS is a comprehensive, evolving cloud computing platform provided by Amazon that offers a mix of infrastructure as a service (IaaS), platform as a service (PaaS), and packaged software as a service (SaaS) offerings.

You will find this term commonly used in Cloud Computing

AWS Certified Cloud Practitioner

Provides an overall understanding of AWS Cloud platform, irrespective of specific technical roles. It covers basic AWS Cloud architectural principles, value proposition, key services, security and compliance aspects, and billing and pricing models.

You will find this term commonly used in Cloud Computing

AWS Certified DevOps Engineer â Professional

Validates expertise in provisioning, operating, and managing distributed application systems on the AWS platform.

You will find this term commonly used in Cloud Computing, DevOps

AWS Certified Security - Specialty

Validates expertise in securing data and workloads in the AWS cloud environment.

You will find this term commonly used in Cloud Security

AWS Certified Solutions Architect â Associate

Demonstrates expertise in designing distributed systems on AWS.

You will find this term commonly used in Cloud Computing

Axelos

Best known for ITIL (IT Infrastructure Library) certifications in IT service management, as well as certifications in project management methodologies like PRINCE2.

You will find this term commonly used in IT Service Management, Project Management

Azure

Azure, Microsoft's cloud computing service, provides a wide range of cloud services, including those for computing, analytics, storage, and networking, enabling businesses to build, deploy, and manage applications.

You will find this term commonly used in Cloud Computing

Azure Functions

Azure Functions is a serverless compute service that lets you run event-triggered code without having to explicitly provision or manage infrastructure, allowing developers to focus on the application logic.

You will find this term commonly used in Cloud Computing

Backbone

In networking, a backbone refers to the principal data routes between large, strategically interconnected networks and core routers. It's the central conduit designed to transfer data at high speeds and capacities, ensuring connectivity across various segments of the internet or within large organizations.

You will find this term commonly used in Networking

Backbone Network

The part of a computer network that interconnects various pieces of the network, providing a path for the exchange of information between different LANs or sub-networks. A backbone can tie together diverse networks in the same building, across different buildings, or over a wide area.

You will find this term commonly used in Networking, Infrastructure

Backbone Network Architecture

The high-capacity network infrastructure that connects various segments of a network, providing a path for the exchange of information between different sub-networks. It is the foundation for internet and intranet communications.

You will find this term commonly used in Networking, Infrastructure

Backhaul Network

The intermediate links between the core network, or backbone network, and the small subnetworks at the edge of the entire network. Essential in telecommunications for connecting cell sites to the network backbone.

You will find this term commonly used in Networking, Telecommunications

Backscatter Analysis

The study of reflections or responses from a communication system that can be used to monitor the health, traffic, and anomalies of a network or to detect and analyze cyber-attacks.

You will find this term commonly used in Networking, Cybersecurity

Backup

The process of creating copies of data to ensure its availability for restoration in case of data loss, corruption, or disasters. Backup strategies are critical for data recovery plans, safeguarding against data breaches, system failures, and other unforeseen events.

You will find this term commonly used in Data Management, Security

Backup and Recovery Strategy

Plans and technologies used by organizations to protect data from loss and to restore data following a loss event. This includes data backup solutions and disaster recovery procedures.

You will find this term commonly used in Data Management, IT Infrastructure

Backup Software

Software designed to create copies of data stored on devices or within systems to enable recovery in the event of data loss. Backup software ensures data integrity and availability, often featuring automation, scheduling, and data compression capabilities.

You will find this term commonly used in Data Management, Security

Balanced Computing

A design philosophy in computing that aims for an optimal balance between the major components of a computer system, such as CPU, memory, and I/O, to achieve maximum efficiency and performance.

You will find this term commonly used in Hardware, Computer Engineering

Balanced Scorecard (BSC) in IT

A strategic planning and management system used to align business activities with the vision and strategy of the IT department, improve internal and external communications, and monitor performance against strategic goals.

You will find this term commonly used in IT Management, Strategic Planning

Balanced Technology Extended (BTX)

A form factor for motherboards and computer cases, designed for improved thermal management compared to the older ATX standard.

You will find this term commonly used in Hardware, Computer Engineering

Band Steering

A technique used in dual-band wireless networks to encourage dual-band capable devices to use the less congested 5 GHz band, improving network efficiency and performance.

You will find this term commonly used in Networking, Wireless Communication

Bandwidth

Bandwidth is a measure of the maximum rate at which data can be transferred over a network or internet connection within a given time frame. It influences how quickly information can be sent or received, impacting everything from streaming quality to download speeds.

You will find this term commonly used in Networking, General IT

Bandwidth Allocation

The process of distributing network bandwidth among various applications, services, or users to ensure optimal performance and fair usage. Bandwidth allocation techniques include Quality of Service (QoS) settings and bandwidth throttling.

You will find this term commonly used in Networking, General IT

Bandwidth Allocation Control Protocol (BACP)

A protocol used in networking to manage the allocation of bandwidth on a wide area network (WAN) link, ensuring efficient use of bandwidth and fair access to network resources.

You will find this term commonly used in Networking, Protocol Design

Bandwidth Allocation Protocol

A method or protocol used in network management to distribute available bandwidth among different applications or users, ensuring efficient use of resources and maintaining quality of service (QoS) for critical applications.

You will find this term commonly used in Networking, General IT

Bandwidth Cap

A limit imposed by Internet service providers on the amount of data that a user can transmit over a network in a given time period. Bandwidth caps are often part of network management strategies to ensure fair use of resources among all users.

You will find this term commonly used in Networking, General IT

Bandwidth Compression

Techniques used to reduce the amount of data transmitted across a network by eliminating redundancies in the data, thus improving transmission speed. Also known as data compression.

You will find this term commonly used in Networking, Data

Bandwidth Management

The process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance.

You will find this term commonly used in Networking, General IT

Bandwidth Reservation System

A system designed to allocate bandwidth resources specifically to certain applications, services, or users to guarantee a minimum level of performance and improve the overall quality of service on a network.

You will find this term commonly used in Networking, Quality of Service

Bandwidth Shaping

The process of managing the bandwidth allocation to various applications or users to ensure optimal performance for critical services. It involves prioritizing network traffic to control the amount of bandwidth each service consumes.

You will find this term commonly used in Networking, Data Management

Bandwidth Throttling

The intentional slowing or speeding of an internet service by an internet service provider (ISP). It is a reactive measure employed in communication networks to regulate network traffic and minimize bandwidth congestion.

You will find this term commonly used in Networking, General IT

Bare Metal

Refers to a computer system or network without any operating system installed. Bare metal environments are often used for the deployment of dedicated resources, such as servers or storage systems, allowing for direct control over hardware.

You will find this term commonly used in Hardware, Cloud Computing

Bare Metal Recovery

The process of restoring a computer system from scratch after a catastrophic failure, including the reinstallation of the operating system, applications, and data, directly to bare metal hardware or a different hardware without needing a previously installed operating system.

You will find this term commonly used in IT Infrastructure, Security

Bare-Metal Hypervisor

A type of virtual machine monitor (VMM) that runs directly on a host's hardware to control the hardware and to manage guest operating systems. Its main purpose is to provide a high-performance and efficient platform for virtualization.

You will find this term commonly used in Virtualization, Cloud Computing

Base Transceiver Station (BTS)

A piece of equipment that facilitates wireless communication between user equipment (UE), like mobile phones, and a network. UEs are connected to the network across the air interface through BTSs.

You will find this term commonly used in Networking, Wireless Communication

What's Your
Career Path?
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Training Hours
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Training Hours
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Training Hours
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Training Hours
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Training Hours
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Training Hours
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Training Hours
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Training Hours
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Training Hours
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Training Hours
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart