IT Terms

From Wikireedia
Jump to: navigation, search

These are the Pages for IT

ADFS2.0

Active Directory Federation Services 2.0 helps IT enable users to collaborate across organizational boundaries and easily access applications on-premises and in the cloud, while maintaining application security

Bare Metal

In disaster recovery, a bare metal restore is the process of reformatting a computer from scratch after a catastrophic failure. Typically the process involves reinstalling the operating system and software applications and then, if possible, restoring data and settings.

BGP

The Border Gateway Protocol (BGP) is the protocol backing the core routing decisions on the Internet. It maintains a table of IP networks or 'prefixes' which designate network reachability among autonomous systems (AS). It is described as a path vector protocol. Most Internet service providers must use BGP to establish routing between one another (especially if they are multihomed). Therefore, even though most Internet users do not use it directly, BGP is one of the most important protocols of the Internet. See Masergy MPLS

Breadcrumbs

Breadcrumb navigation allows users to click on a icon and show them where they have been in a website as well as where there are on a website. For instance clicking the Breadcrumb icon would show them how far down a directory structure they are.

Canonical

A computer science term which means the natural or normal state. For instance a canonical file structure means a typical file structure that includes Directories and files in a hierarchy.

Captive Portal

Technique forces an HTTP client on a network to see a special web page (usually for authentication purposes) before using the Internet normally

Certificate Authority

By setting up a Certificate Authority on your own server you can set up https ssl to manage secure connections to your intranet. This is an alternative to obtaining an external certificate. For more information see [1]

CIFS

Common Internet File System. Mostly used for sharing files over the LAN. Operations such as Read write delete and rename are supported but the files remain on the remote server.CIFS requires other protocols for such as NetBIOS#NetBIOS over TCP

Denial of Service Attack

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root name servers

DIA

Dedicated Internet Access. Using a Point to Point circuit. A PtP circuit is a private line between two locations. MPLS is a service between two or more locations that is a modern replacement for IP, ATM and/or Frame Relay. MPLS allows appropriate priority to be given when various types of data are transmitted between the locations; voice, video, application (for example, Citrix) and/or other data services can be accommodated with priorities assigned for suitable handling.

EAI

Application Enterprise Application. These integration tools could be Object Oriented Architecture, XML, Middleware

Elevated Command Prompt Windows X

Allows user to run commands with Administrator privileges such as CHKDSK In the Start Menu search box area, type cmd and press CTRL+SHIFT+ENTER This will run the cmd from \windows\system32. Useful if you cannot able to see a Run as Administrator prompt

Federated Cloud

Federated Cloud is an integrated approach to cloud computing that tailors the cloud deployments to fit the organisation's existing and evolving business needs. Within the Federated Cloud framework, you can design, build, and manage a mix of private and shared cloud computing deployments, whether they be on premise or hosted off-premise

FooBar

FooBar is a placeholder for computer variables etc. For instance if you are writing a script that included a website but you didn't know what the website was called yet you might put the placeholder www.foo.com or www.bar.com etc. The technical term is metasyntactic variable

Compare with Contoso, Microsoft's fictious company it uses as a universal example

GRE

Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol internet work.

Grid Computing

Like Server Clusters but more loosely couples, heterogeneous and distributed. The World Community Grid is a good example of millions of PC's processing power devoted to computing calculations

GPO

Group Policy Object. Used in Window Server Operating system to determine the user's working environment on the network


HBA

Host Bus Adapter - connects a host system (the computer) to other network and storage devices. The terms are primarily used to refer to devices for connecting SCSI, Fibre Channel and eSATA devices, but devices for connecting to IDE, Ethernet, FireWire, USB and other systems may also be called host adapters. See also TOE

JAR

Java Archive File. JAR files are built on the ZIP file format and have the .jar file extension. Computer users can create or extract JAR files using the jar command that comes with a JDK

JBOSS

LDAP

Lightweight Directory Access Protocol, or LDAP is an application protocol for querying and modifying directory services running over TCP/IP

A directory is a set of objects with similar attributes organized in a logical and hierarchical manner. The most common example is the telephone directory, which consists of a series of names (either of persons or organizations) organized alphabetically, with each name having an address and phone number attached. Due to this basic design (among other factors) LDAP is often used by other services for authentication, despite the security problems this causes.

An LDAP directory tree often reflects various political, geographic, and/or organizational boundaries, depending on the model chosen. LDAP deployments today tend to use Domain name system (DNS) names for structuring the topmost levels of the hierarchy. Deeper inside the directory might appear entries representing people, organizational units, printers, documents, groups of people or anything else that represents a given tree entry (or multiple entries).

M2M

Machine-to-Machine (M2M) refers to technologies that allow both wireless and wired systems to communicate with other devices of the same ability. M2M uses a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.), which is relayed through a network (wireless, wired or hybrid) to an application (software program), that translates the captured event into meaningful information (for example, items need to be restocked).

MAC Address

A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies including Ethernet. MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address. It may also be known as an Ethernet hardware address (EHA), hardware address or physical address.


Microprocessors

MIME

Multipurpose Internet Mail Extension is an email protocol that allows email users open various types of extensions especially non-text medai type. S/MIME stands for secure

Motherboard

Is the central Printed Circuit Board (PCB) that the main components of the computer are attached to such as CPU and memory and heat sink, etc

MX Record

A mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how email should be routed with the Simple Mail Transfer Protocol

N+1

Is a form of redundancy. For instance if a server went down a N+1 redundancy would indicate that the information is stored and retrievable elsewhere

NAT Traversal

NAT traversal is a general term for techniques that establish and maintain Internet protocol connections traversing network address translation (NAT) gateways. Network address translation breaks end-to-end connectivity. NAT traversal techniques are typically required for client-to-client networking applications, especially peer-to-peer and Voice over IP (VoIP) deployments. Many techniques exist, but no single method works in every situation since NAT behavior is not standardized. Many NAT traversal techniques require assistance from a server at a publicly-routable IP address. Some methods use the server only when establishing the connection, while others are based on relaying all data through it, which adds bandwidth costs and increases latency, detrimental to real-time voice and video communications.

Most NAT behavior-based techniques bypass enterprise security policies. Enterprise security experts prefer techniques that explicitly cooperate with NAT and firewalls, allowing NAT traversal while still enabling marshalling at the NAT to enforce enterprise security policies. SOCKS, is the oldest NAT traversal protocol. Universal Plug and Play (UPnP) is supported by most small NAT gateways. NAT-T is commonly used by IPsec virtual private network clients in order to have Encapsulating Security Payload packets traverse NAT.

NFC

Near Field Communication devices are shortwave wireless devices that can exchange information at short distances. For instance automated payment, transfer of data with other NFC devices, unlocking doors, etc. This is similar to Bluetooth except that data transfer is over very much smaller distances.

.NET

The .NET Framework is a software framework for Microsoft Windows operating systems. It includes a large library, and it supports several programming languages which allows language interoperability (each language can use code written in other languages). The .NET library is available to all the programming languages that .NET supports

Network Concentrator

A device somewhat like a hub that looks like router that combines circuits from other locations to or from the internet

NFS

Network File System (NFS) is a network file system protocol originally developed by Sun Microsystems allowing a user on a client computer to access files over a network in a manner similar to how local storage is accessed

NOC

Network operation center. Usually hosted data centers.

OU

Organizational unit. Provides a way of classifying objects located in directories. Used either to differentiate between objects with the same name (John Doe in OU "marketing" versus John Doe in OU "customer service"

PCL

Printer Command Language is a defacto standard developed by HP. In general terms the the higher the PCL number i.e. 6 the greater the number of printing options it has in terms of font rendering, WYSIWYG printing outputs etc.

RMAN

Oracle Recovery Manager RMAN optimizes performance and space consumption during backup with file multiplexing and backup-set compression, and integrates with Oracle Secure Backup and third-party media-management products for tape backup such as Back-Up Exec

Samba

Samba is a free software re-implementation. As of version 3, Samba provides file and print services for various Microsoft Windows clients and can integrate with a Windows Server domain, either as a Primary Domain Controller (PDC) or as a domain member. It can also be part of an Active Directory domain. Samba sets up network shares for chosen Unix directories (including all contained subdirectories).

Samba runs on most Unix and Unix-like systems, such as GNU/Linux

Samba allows file and print sharing between computers running Windows and computers running Unix. It is an implementation of dozens of services and a dozen protocols, including the NetBIOS over TCP/IP (NBT), SMB, CIFS (an enhanced version of SMB), DCE/RPC or more specifically, MSRPC, the Network Neighborhood suite of protocols, a WINS server also known as a NetBIOS Name Server (NBNS), the NT Domain suite of protocols which includes NT Domain Logons, Secure Accounts Manager (SAM) database, Local Security Authority (LSA) service, NT-style printing service (SPOOLSS), NTLM and more recently Active Directory Logon which involves a modified version of Kerberos and a modified version of LDAP. All these services and protocols are frequently incorrectly referred to as just NetBIOS or SMB. The NetBIOS and WINS protocols are deprecated on Windows.

Telnet

Telnet is a computer protocol like http and ftp. Telnet stands for 'telecommunications network', and was built to be form of remote control to manage mainframe computers from distant terminals. Telnet has evolved into a new modern version of remote control called 'SSH', that network administrators use today to manage linux and unix computers from a distance. Another kind of Telnet client is PuTTY

TOE

TCP offload engine or TOE is a technology used in network interface cards (NIC) to offload processing of the entire TCP/IP stack to the network controller.

UAC

User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system. In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not inherit those privileges unless they are approved beforehand or the user explicitly authorizes it.

UNC

Universal Naming Convention is used by Microsoft to designate its directory path names. In most cases this is double backslash computer name backslash directory name or file name and so on. i.e.\\computer\directory\file. Compare with Unix or the internet that uses forward slash

XML

XML is a machine readable code similar and simpler than HTML. RSS, SOAP ATOM are all XML based formats. EDI messages are sent via XML to customers and Syncada, etc

/30 BIT IP Subnet Mask

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox