Find out the latest news in IT

White Papers

Learn about IT solutions that can help your business grow

Case Studies

How we help businesses like yours succeed

IT Glossary

Find out the latest news in IT


A Full List of IT Terminology

We’ve compiled a full list of commonly encountered IT terminology that will help you better understand the industry and how it works. By familiarizing yourself with basic computer terms and definitions, you’ll allow yourself to understand manuals, descriptions, and everyday jargon necessary to fully grasp IT products and services.

You’ll find our tech glossary is conveniently laid out below in alphabetical order with an easy navigation interface so you can quickly reference words related to technology.

In addition to our tech terms, you can also find other resources to help you learn more about the role of technology in modern industry, including blogs, whitepapers, and case studies. Though our list of IT terms to know is expansive, if you have any further questions regarding things to know about technology, please contact us.



A local area network (LAN) is composed of computers and other devices that exist within the same location and are capable of accessing and sharing resources and devices.



Mobile Device Management (MDM) is a type of security software that allows IT administrators to monitor, secure, and implement policies on employees’ laptops, mobile phones and tablets. Its purpose is to ensure the security of the devices and to optimize their functionality within the organization in order to protect the corporate network.

Related Resources


Migration is the process by which a user moves from one operating environment to another that is more current and efficient. It is usually done through the integration of newer hardware, software or a combination of both.

Related Resources


Malware, or malicious software, is a type of program or code that takes control over operations by invading, damaging or disabling computers, networks, or other devices. They may include viruses, worms, Trojan horses, spyware, etc. and are generally used to steal, delete, or encrypt user information and data.

Related Resources



Power over Ethernet (POE) is a technology for wired LANs that allow the network cable to carry electrical power. This allows for the connection of network devices and also minimizes the number of wires used to install the network.

Related Resources

  • LAN


A patch (or fix) refers to software that serves as a quick repair job to resolve functionality issues, improve security, and add new features to an operating system or a piece of programming. They are often temporary fixes until the developer packages the newer updates for the operating system or software.

PCI Compliance

PCI Compliance refers to a set of security standards enforced by the PCI Standards Council that applies to all companies that accept, process, store or transmit credit card information to maintain a secure and uniform transaction environment.

Related Resources


A private branch exchange (PBX) is a private telephone network used within an organization or company and enables users to communicate both internally and externally using various communication channels like VoIP, ISDN or analog. PBXs are used to assign internal extensions, manage voice mail etc.

Related Resources

  • VoIP


Platform as a Service is offered within cloud computing solutions and provides hardware and software tools usually needed for developing and launching an app which allows users to run, and control applications over the internet without the complexity of establishing and maintaining the infrastructure themselves.

Related Resources

  • HaaS
  • IaaS