Glossary A-Z

Application Servers
Servers that are dedicated to certain programs or applications



In computing, a blacklist or block list is a basic access control mechanism that allows everyone access, except for the members of the black list (i.e. list of denied accesses). The opposite is a whitelist, which means allow nobody, except members of the white list. As a sort of middle ground, a greylist, contains entries that are temporarily blocked or temporarily allowed. Greylist items may be reviewed or further tested for inclusion in a blacklist or whitelist.



In computer engineering, a cache is a component that transparently stores data so that future requests for that data can be served faster. The data that is stored within a cache might be values that have been computed earlier or duplicates of original values that are stored elsewhere. If requested data is contained in the cache (cache hit), this request can be served by simply reading the cache, which is comparatively faster. Otherwise (cache miss), the data has to be recomputed or fetched from its original storage location, which is comparatively slower. Hence, the more requests can be served from the cache the faster the overall system performance is.


Citrix XenApp 

A Thin client product that allows users to connect to their corporate applications. XenApp can either host applications on central servers and allow users to interact with them remotely or stream and deliver them to user devices for local execution.


Cloud Computing

The act of using the Cloud (internet) to do the processing or computing for the client, this could refer to a lot of terms which all will be included in this terms page


Computers or servers in bunches or groups, allowing more processing power then a single server.


Data Repositories’
Data warehouses’; a location that has multiple servers for storing large amounts of data.


Central processing unit- CPU

The central processing unit (CPU) is the portion of a computer system that carries out the instructions of a computer program, and is the primary element carrying out the functions of the computer or other processing device. The central processing unit carries out each instruction of the program in sequence, to perform the basic arithmetical, logical, and input/output operations of the system.


Database Server
a server that holds data or databases.


Data Backup
A redundant duplication of data across the server or servers. In our case it could mean a duplication of your localized client or server to our cloud based redundant system.


Dedicated Server
Not a virtual server, but an actual server that is in a colocation and available for use by the client.


DSL modem

A Digital Subscriber Line (DSL) modem is a device used to connect a computer or router to a telephone circuit that has Digital Subscriber Line service configured. Like other modems, it is a type of transceiver.


Not the same, but always changing


Email Hosting
Instead of managing the email server in house, you can have a company that manages multiple servers offer the hosting or management of your email environment. In our case, Microsoft Exchange is the enterprise application and the industry standard to use for email.


A dedicated system that block unauthorized access while permitting authorization of certain applications or communication protocols.


1024 Megabytes; a size of data storage



Hardware is a general term for the physical artefacts of a technology. It may also mean the physical components of a computer system, in the form of computer hardware.


Hard disk drive

A hard disk drive (HDD) is a non-volatile, random access device for digital data. It features rotating rigid platters on a motor-driven spindle within a protective enclosure. Data is magnetically read from and written to the platter by read/write heads that float on a film of air above the platters.



HDX is a technology used in Hosted Desktop to improve the speed and quality of Flash movies and pages. This technology seamlessly fetches the Internet flash content from your local machine and integrates it into your Hosted Desktop screen.

Hosted Desktop

A hosted (or virtual) desktop looks and acts exactly like a traditional PC but instead of residing on your PC, software applications and data are housed in data centre’s.


Internet Message Access Protocol – IMAP

lnternet message access protoco (commonly known as IMAP) is one of the two most prevalent Internet standard protocols for email retrieval, the other being the Post Office Protocol (POP). Virtually all modern email clients and mail servers support both protocols as a means of transferring e-mail messages from a server.


IP address

An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.[1] An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there.


Internet Service Provider; this is the company that offers the internet to the client or company.


Local area network – LAN

A local area network (LAN) is a computer network that connects computers and devices in a limited geographical area such as home, school, computer laboratory or office building. The defining characteristics of LANs, in contrast to wide area networks (WANs), include their usually higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines.



A secure, dependable communication system which takes advantage of the latest technology to increase speed and ease of communicating between all levels and areas of your company.


Network Security
The process of closing or limiting exploits in a network, adding Security between the local clients and switches of a company.


Operating System- OS

An operating system (OS) is software, consisting of programs and data, that runs on computers, manages computer hardware resources, and provides common services for execution of various application software.


1024 Terabytes; a size of data storage


Post Office Protocol (POP)

In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP (Internet Message Access Protocol) are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern e-mail clients and servers support both. The POP protocol has been developed through several versions, with version 3 (POP3) being the current standard. Like IMAP, POP3 is supported by most webmail services such as Hotmail, Gmail and Yahoo! Mail.


Proxy server

In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server.


Personal Storage Table- .pst

In computing, a Personal Storage Table (.pst) is an open proprietary file format used to store copies of messages, calendar events, and other items within Microsoft software such as Microsoft Exchange Client, Windows Messaging and Microsoft Outlook. The open format is controlled by Microsoft who provide free specifications and free irrevocable technology licensing.


Random-access memory- RAM

Random-access memory (RAM) is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored data to be accessed in any order with a worst case performance of constant time.


Remote Backup
The backup system that is not onsite, meaning that it is in a remote location.



A router is a device that forwards data packets across computer networks. Routers perform the data "traffic directing" functions on the Internet. A router is connected to two or more data lines from different networks. When data comes in on one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table, it directs the packet to the next network on its journey or drops the packet. A data packet is typically passed from router to router through the networks of the Internet until it gets to its destination computer unless the source IP is on a private network.



In computing, the term server is used to refer to one of the following:

  • a computer program running as a service, to serve the needs or requests of other programs (referred to in this context as "clients") which may or may not be running on the same computer.
  • a physical computer dedicated to running one or more such services, to serve the needs of programs running on other computers on the same network.
  • a software/hardware system (i.e. a software service running on a dedicated computer) such as a database server, file server, mail server, or print server.

In computer networking, a server is a program that operates as a socket listener. The term server is also often generalized to describe a host that is deployed to execute one or more such programs.


Search Engine Optimization; to optimize your websites code, content, and tags to make it friendlier for the search engines bots to crawl and understand.


Not changing, but always the same.



Computer software, or just software, is a collection of computer programs and related data that provide the instructions for telling a computer what to do and how to do it. In other words, software is a conceptual entity which is a set of computer programs, procedures, and associated documentation concerned with the operation of a data processing system.


Spam Filtering

Email Spam filtering is the processing of email to organize it according to specified criteria. Most often this refers to the automatic processing of incoming messages, but the term also applies to the intervention of human intelligence in addition to anti-spam techniques, and to outgoing emails as well as those being received.


1024 Gigabytes; a size of data storage


Thin Client

A thin client is a small, inexpensive, computer that consumes a fraction of the power of a PC and needs little or no maintenance because it uses a network server to run function, applications and do most of its work.


Universal Serial Bus- USB

Universal Serial Bus (USB) is a specification[3] to establish communication between devices and a host controller (usually a personal computer), which has effectively replaced a variety of earlier interfaces such as serial and parallel ports.

USB can connect computer peripherals such as mice, keyboards, digital cameras, printers, personal media players, USB flash drives, USB network adapters, and external hard drives. For many of those devices, USB has become the standard connection method.


USB flash drive

A USB flash drive consists of a flash memory data storage device integrated with a USB (Universal Serial Bus) interface. USB flash drives are typically removable and rewritable, and physically much smaller than a floppy disk.


Virtual Desktop Interface or Virtual Device Interface; Taking a non virtual system or device and making it virtual. In our case, take your typical desktop environment (Windows XP or Vista) and putting it on a server.


Virtual Desktop

A hosted (or virtual) desktop looks and acts exactly like a traditional PC but instead of residing on your PC, software applications and data are housed in data centre’s.


Virtual Server

A virtual server is usually multiple servers which look like one server on a network and are able to run applications and functions on separate computers on the network.



or voice over internet protocol, makes voice calls possible over a broadband internet connection rather than a traditional phone line, allowing the combination of voice and data applications on a single network while saving money on long-distance bills.


Web browser

A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.


Wide area network- WAN

A wide area network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries).[1] This is in contrast with personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs) which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively.



A whitelist or approved list is a list or register of entities that, for one reason or another, are being provided a particular privilege, service, mobility, access or recognition. As a verb, to whitelist can mean to authorize access or grant membership. Conversely, a blacklist is a list or compilation that identifies entities that are denied, unrecognised, or ostracised.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request


Powered by Zendesk