IT Glossary

Active Directory (AD) is a directory service from Microsoft that is based on the LDAP protocol. It is often used to authorize and authenticate users or devices and can only be used in a Windows OS. Read more

Active/Active is the name for a cluster architecture in which two or more servers process data simultaneously. Read more

A cluster in active/passive mode processes all the data on one “active” server, which is then replicated to a “passive” server or servers. This This essentially creates a functional backup that is ready to take over the tasks of the “active” server in case of failure. Read more

All Flash Storage is the term for a disk array that contains only flash storage (SSD). This storage type is also referred to as a Solid-State Array (SSA). Read more

An Apache HTTP server is a program running on a server connected to an internet network that delivers individual web pages to browsers. This widely used web server is open-source software, making it available to everyone for free. Read more

CIS Benchmarks represent a set of globally respected best practices for protecting IT systems against cyber threats. Benchmarking generally compares a system to official recommendations from, e.g., hardware manufacturers, software publishers, or institutions. Read more

Cloud computing is defined as accessing a service, program, or other software remotely over an internet connection. This model is based on a shared infrastructure of hardware and software resources at the service provider’s data centre, offering high and guaranteed availability. Read more

CSIRT (Computer Security Incident Response Team) refers to a team that handles security incidents on a computer network. This type of group is usually associated with a specific region or organisation. For example, CSIRT.CZ operates in the Czech Republic. Read more

Data durability means data consistency and resiliency to various threats over a long period. It is an important characteristic for data storage since it reflects its ability to cope with, for example, disk failures or fragmented data on a particular storage infrastructure node. Read more

Data ingestion is loading data from one or more sources to a target location for further processing. The data ingestion process may also be in real-time or in batches at various intervals. In some cases, a combination of both methods is used. Read more

Fork is the term for branching a project; it is most often used in the context of software development. When a fork is founded, it creates an alternative version of the original software, which is further developed in its own way. Thus, although the two software variants are identical at the point of forking, they gradually become increasingly different projects. Read more

Free cooling represents an economical method of cooling data centres by way of taking the warm air out of the data centre and bringing in the cool outside air. This eliminates expensive compressor cooling. Read more

In a geo-cluster, data is stored on two or more nodes in geographically separated locations. If one node fails, the service continues to run from the other location. Thus, geo-clusters are characterised by high availability and help prevent data loss. Read more

The 403 Forbidden status code (sometimes called “access denied”) is displayed when a user is not authorised to view a certain page. Thus, the server understands the client’s request but cannot comply without authorisation. Read more

The 500 Internal Server Error page signalises an unspecified server-side error. Unfortunately, it is also the most generic 5xx status code, and sometimes, it is difficult to determine the cause. Read more

Hypervisor is software that can virtualise hardware resources into isolated virtual machines. They can also run different operating systems, meaning multiple operating systems run on a single piece of hardware. However, all applications, services, and development environments are operated in isolation. Read more

IOPS is an abbreviation for “input/output operations per second”, which indicates how many input and output requests a device can process per second. IOPS is typically measured, for example, for SSDs or more complex data storage. Read more

LDAP (Lightweight Directory Access Protocol) is a protocol that is used to work with data on a directory server. Using LDAP, data can be stored in a tree structure, and then accessed. The most common use case is working with user information. Read more

MariaDB is a popular open-source relational database based on MySQL and works as its own development branch. This split was due to the original developers’ concerns about keeping the free license GNU GPL. Read more

Microservices refer to smaller applications that are interconnected and form the architecture of more complex software. The advantage is faster development and the ability to create and test individual microservices in isolation. Read more

NoSQL is a type of database system that is not based (only) on relational tables, as in the case of SQL. Hence, it is typically used for unstructured data, such as videos or images. Read more

On-demand services are focused on satisfying customer needs as quickly as possible without requiring a large initial investment. Typically, these are services for which you pay a regular monthly fee or pay-as-you-go. Read more

Out-of-band is the term for communication outside the main channel or data transmission over another frequency band. Out-of-band is used, for example, in managed servers. Read more

Rack housing is a kind of server housing where a company uses an entire rack (or a significant part of it) for its servers in a data centre. Enterprises with many servers and technologies, such as routers or switches, mostly use this service. Read more

Redundancy means excess over the necessary. In the context of IT technology, the word redundancy is used in various ways. Read more

RPO

The Recovery Point Objective (RPO) value tells you the point in the past at which data can be recovered; in other words, the maximum amount of downtime and, therefore, data loss. Thus, RPO is a key indicator of data availability. Read more

RTO

The Recovery Time Objective (RTO) value represents the maximum recovery timeframe from an outage. Thus, it is an important indicator of the service level. Read more

The abbreviation SPOF (single point of failure) is a term for a weak spot in the IT infrastructure. When this point of the infrastructure fails, the entire system becomes inoperable. Read more

SQL

SQL stands for Structured Query Language. It is widely used and is used in relational database systems, such as MySQL, PostgreSQL, MariaDB, and SQLite. Read more

SSH

SSH (Secure Shell) is a protocol for encrypted communication between two devices within a computer network. SSH can be used to control the command line or to send data from one device to another, for example, to copy files from a computer to a server. Read more

Storage all flash is the term for a disk array that contains only flash storage (SSD). This type of storage is also sometimes known as a Solid-State Array. Read more

The vCloud Director platform enables virtual machine deployment, automation, and management. With its multitenant architecture, hosting providers also use it to administer customer cloud services. Read more

A zero-day attack is a type of cyber-attack that exploits a vulnerability in software that the developers are not yet aware of. Read more

Nevidíte vaši vysněnou pozici?

Pošlete nám životopis, a my se vám ozveme!

    * Povinný údaj
    Zasláním životopisu souhlasím se zpracováním osobních údajů za účelem náboru a výběrového řízení.