Resources
Blog
Find out the latest news in IT
White Papers
Learn about IT solutions that can help your business grow
Case Studies
How we help businesses like yours succeed
IT Glossary
Find out the latest news in IT
Glossary
A Full List of IT Terminology
We’ve compiled a full list of commonly encountered IT terminology that will help you better understand the industry and how it works. By familiarizing yourself with basic computer terms and definitions, you’ll allow yourself to understand manuals, descriptions, and everyday jargon necessary to fully grasp IT products and services.
You’ll find our tech glossary is conveniently laid out below in alphabetical order with an easy navigation interface so you can quickly reference words related to technology.
In addition to our tech terms, you can also find other resources to help you learn more about the role of technology in modern industry, including blogs, whitepapers, and case studies. Though our list of IT terms to know is expansive, if you have any further questions regarding things to know about technology, please contact us.
A
Agility
Agility refers to the ability to migrate and integrate various changes to systems of technology efficiently. Quick and easy adaptation is crucial to maintaining optimal performance in all IT infrastructures.
Related Resources
Asset Management
Asset management is used to keep track of technology investments of a business to maintain the lifecycle and organize all assets. Proper management ensures a cost-effective approach to getting the most value out of your vendors and investments.
Related Resources
Anti-virus
An antivirus is a program that exists to protect devices from any variety of cyber viruses and to remove any viruses that exist already.
Related Resources
B
Backup
Backup entails the process of creating copies of data that can later be accessed and recovered in the event of deletion of information. Companies can risk considerable lasting damage to their data, downtime and overall business operations if not done often and correctly.
Related Resources
- Continuity
- Is Your Business Protected Against Downtime?
- The Importance of Backups: Restoring Data After A Breach
- Cost-Effective Data Recovery Support from CRA
- Backup & Disaster Recovery
- Data Loss Prevention
Backup & Disaster Recovery
Backup and disaster recovery are a set of policies and procedures that enable the retrieval of data and information that may have been misplaced due to deletion or corruption. It focuses on standard requirements and the appropriate execution plan before a critical event can occur.
Related Resources
- Continuity
- Why IT Back Up and Disaster Recovery Solutions are Critical to Healthcare
- Why is a BDR solution important for your business?
- Cost-Effective Data Recovery Support from CRA
- Backup
- Data Loss Prevention
Breach
A breach, in regards to data, refers to the stealing or taking of information from a system without the consent, awareness, or authorization from the system’s user.
Related Resources
- The 17 Types of Cyber Attacks You're Likely To Face
- The Importance of Backups: Restoring Data After A Breach
- Anti-virus
BYOD
Bring Your Own Device (BYOD) is a system established which allows a user to use their personal devices (mobile phones, tablets, laptops, etc.) for business purposes.
Related Resources
- Collaboration
- Pros, Cons and Solutions to Maximize BYOD
- Learn More About BYOD Strategies For Your Business
- How to Make the Best of BYOD
- Collaboration
C
Cloud Storage
Cloud storage refers to a model of data storage where digital information is stored, managed and maintained, and backed up remotely through a cloud computing provider while remaining available for access to a user over a network.
Related Resources
- Cloud Solutions
- What is the Cloud?
- Cost-Saving Benefits of Cloud Computing
- What to Consider Before Migrating to the Cloud
- Leveraging the Cloud for Security
- The Year of the Cloud - Looking Back at 2017
- Ins & Outs of the Cloud Computing Stack
- Cloud Storage
- Private Cloud
- Public Cloud
- Hybrid Cloud
Private Cloud
A private cloud allows for more customization and control over data and is only available to a select user or group instead of the general public. They are accessible generally over the internet or a private internal network which allows for a more protected environment.
Related Resources
- Cloud Solutions
- Cost-Saving Benefits of Cloud Computing
- What to Consider Before Migrating to the Cloud
- Leveraging the Cloud for Security
- The Year of the Cloud - Looking Back at 2017
- Ins & Outs of the Cloud Computing Stack
- Cloud Storage
- Private Cloud
- Public Cloud
- Hybrid Cloud
Public Cloud
A public cloud allows information to be accessed and stored in widespread data centers provided by third-parties and is usually accessible to the general public over the Internet.
Related Resources
- Cloud Solutions
- Cost-Saving Benefits of Cloud Computing
- What to Consider Before Migrating to the Cloud
- Leveraging the Cloud for Security
- The Year of the Cloud - Looking Back at 2017
- Ins & Outs of the Cloud Computing Stack
- Cloud Storage
- Private Cloud
- Public Cloud
- Hybrid Cloud
Hybrid Cloud
Hybrid cloud allows businesses to seamlessly scale on-premises infrastructure and computing resources by combining a private cloud with public cloud services. This model offers security, scalability, flexibility, and is often the most cost-effective solution to cloud computing.
Related Resources
- Cloud Solutions
- Cost-Saving Benefits of Cloud Computing
- What to Consider Before Migrating to the Cloud
- Leveraging the Cloud for Security
- The Year of the Cloud - Looking Back at 2017
- Ins & Outs of the Cloud Computing Stack
- Cloud Storage
- Private Cloud
- Public Cloud
- Hybrid Cloud
Cluster
A cluster is defined as a group of servers and other devices that act as a single system to enable high availability and, in some cases, load balancing and parallel processing.
Related Resources
- Rack
Corrupt Data
Data corruption happens when code or information is intentionally or unintentionally changed from its original correct form and becomes broken, unreadable and sometimes inaccessible. Corruption can be logical or random and usually occurs when a piece of data loses its base integrity that can cause a break in a program or can render a file useless to a user.
Related Resources
Collaboration
Collaboration is the process of providing software through different types of network structures that create a consistent user experience through various devices and also stores data off-premises. These tools help drive more efficient work practices and enhance communication in the modern business environment.
Related Resources
Compliance
Compliance refers to the process of ensuring your business and all its employees are in accordance with established laws, regulations, standards and ethical practices that are relevant to your organization.
Related Resources
- GDPR
- HIPAA
CPU
A Central Processing Unit (CPU) is the main component of a computer that processes all instructions. It runs the operating system and applications, continuously receiving input from the user or active software programs, then producing output that is either displayed on a screen or stored in an application.
Related Resources
- HaaS
CRM
A Customer Relationship Management (CRM) uses a collection of information to provide solutions that improve how you interact and conduct business with a customer. CRM systems and applications are intended to ensure customer relationships are prosperous, track engagements and deliver data.