[Term of the Day]:Content Management System
Term of the Day “Content Management System” Definition — What is CMS? CMS stands for the Content Management System. CMS is a software that helps you create, edit, delete, and manage content for your website using a user-friendly interface, rather than needing to work directly with the code. CMS makes managing a web-based application or website much easier for users of all technical levels. Content management also ensures that whatever content you have is indexable or searchable, making it
[Term of the Day]: MIME
Term of the Day “Multi-purpose Internet Mail Extension” Definition — What is MIME? MIME is an internet standard for formatting non-ASCII messages so that they can be sent over the Internet. It helps extend the limited capabilities of email by allowing insertion of images, sounds and text in a message so that e-mails could include information other than just plain text. Most e-mail clients support MIME and now MIME types are not just for use with e-mail; they have been adopted by Web servers as
[Term of the Day]: Gamification
Term of the Day “Gamification” Definition — What is Gamification? Gamification is a popular business tool. It is the concept to integrate game design elements into non-game applications (business applications) that already exist. This improves user experience and participation. Businesses can easily implement to create innovative programs by weaving suitably fun features such as leaderboards and badges into an existing system. When users participate and engage with your gamification initiative,
[Term of the Day]: Data Mining
Term of the Day “Data Mining” Definition — What is Data Mining and its purpose? Data Mining, also known as Knowledge Discovery in Data (KDD), is a process of digging through and analyzing enormous sets of data and then extracting the meaningful patterns and trends. In general, “Mining” is the process of extraction of some valuable material from the earth e.g. coal mining, diamond mining and so on. In the context of computer science, “Data Mining” refers to the extraction of useful information
[Term of the Day]: DevOps
Term of the Day “DevOps” Definition — What is DevOps? DevOps is a collaboration of two words Development and Operations, it is the process that works to automate and integrate the processes between software development (Dev) and IT Operations (Ops) teams. The practice of DevOps also encourages smoother, continuous communication, collaboration, integration, visibility, and transparency between software Development teams and their IT Operations teams. Organizations that adopt DevOps culture
[Term of the Day]: QoS
Term of the Day “Quality of Service” Definition — What is Quality of Service? The acronym QoS stands for the technical term ‘Quality of Service’. In general, it is referred to as networking technologies and techniques, that manage data traffic to reduce packet loss, latency, and jitter on the network. QoS is required in organizations wherever there is network congestion. QoS has been a critical requirement for the WAN for years. The internet is an indispensable resource for the great majority
[Term of the Day]: Cloudbursting
Term of the Day “Cloudbursting” Definition — What is Cloudbursting and how could it be beneficial to businesses? Cloud bursting is all about the dynamic deployment of applications that normally run on a private cloud or data center and bursts into a public cloud to augment when the demand for computing capacity spikes. The internal computing resource is the “Private Cloud” and the external cloud is typically a “public cloud” for which the organization gets charged on a pay-per-use basis. If an
[Term of the Day]: Business Intelligence
Term of the Day “Business Intelligence” Definition — What is Business Intelligence? Business intelligence (BI) is a technology-driven process used by the organization to analyze data and business information. It encompasses a set of processes, architectures, and technologies that convert raw data into meaningful information, which provides clear insights to managers and other authorities in strategic decision making. The processed data received through Business intelligence tools can play
[Term of the Day]: Cryptojacking
Term of the Day “Cryptojacking” Definition — What is Cryptojacking and how can you protect your devices from this? Cryptojacking is a cyber-attack that allows hackers to use devices such as computers, smartphones, tablets, or even servers without the consent or knowledge of the users to mine cryptocurrencies such as Bitcoin and Ethereum. Cryptocurrency has been on the rise in recent years, so it’s no surprise that cryptojacking is also on the rise as hackers continuously come up with new ways
[Term of the Day]: Risk Management
Term of the Day “Risk Management” Definition — What is Risk Management? Risk management is the process of planning, organizing, directing, and controlling the human and material resources of an organization. Every business and organization faces the risk of unexpected, harmful events which impact on the achievement of specific objectives. They can be either a negative or positive impact. The negative impact represents risks that may prevent the creation of value or even destroy existing value.
[Term of the Day]: Cryptography
Term of the Day “Cryptography” Definition — What is Cryptography and what is its purpose? Cryptography is the practice and study of techniques for securing information and communications through the use of codes so that only those persons for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. Cryptography is a sub-discipline of cryptology, whose meaning is derived from the Greek words “Kruptós” and “logos” meaning “hidden word”.
[Term of the Day]: Kerberos
Term of the Day “Kerberos” Definition — What is Kerberos? Kerberos is a network authentication protocol designed to provide strong authentication for client/server applications by means of secret-key cryptography. The authentication is based on tickets used as credentials, allowing communication and proving identity in a secure manner even over a non-secure network. Kerberos was initially developed by the Massachusetts Institute of Technology (MIT) for Project Athena in the 1980s. The protocol
[Term of the Day]: Over-the-top
Term of the Day “Over-the-top (OTT)” Definition — What is OTT and what is its purpose? The acronym OTT stands for Over-the-top that refers to film and television content provided via a high-speed Internet connection at the request and to suit the requirements of the individual consumer. The term itself stands for “over-the-top”, which implies that a content provider is going over the top of existing internet services. With OTT video delivery technology, people now have a multitude of options
[Term of the Day]: CRM
Term of the Day “Customer Relationship Management” Definition — What is CRM? CRM stands for customer relationship management. As its name suggests, CRM software is a system that helps businesses manage all the interactions it has with customers and potential customers. It includes various strategies and techniques to maintain a healthy relationship with the organization’s existing as well as potential customers. CRMs can be customized to meet requirements that vary from organization to
[Term of the Day]: Optical Character Recognition
Term of the Day “Optical Character Recognition (OCR)” Definition — What is OCR and what is it used for? Optical character recognition is usually abbreviated as OCR, also called text recognition, is a technology that converts images to text so that computers can extract text data from image files. This can be a huge productivity shortcut for students, researchers, and entrepreneurs who deal with a lot of documents. Once you process a document with OCR technology, you can easily edit, search, index,
[Term of the Day]: Subject Matter Expert
Term of the Day “Subject Matter Expert” Definition — What is SME? The Subject Matter Expert also referred to as "SME", an individual who is highly knowledgeable in a pertinent field within the organization. SMEs are in high demand in organizations, they provide technical advice on process designs and product specifications, they work either as external consultants or internal staff. SME's play a vital role in different working sectors like BPO's, HelpDesk, Human Resource Management,
[Term of the Day]: zettabyte (ZB)
Term of the Day “zettabyte (ZB)” Definition — What does zettabyte (ZB) mean? A zettabyte is a unit of measurement used by technology professionals and the general public to describe a computer or other device's storage capacity. The number of bytes is equal to 2 to the 70th power, also expressed as 1 sextillion bytes. One Zettabyte is approximately equal to a thousand Exabytes, a billion Terabytes, or atrillion Gigabytes. For more than a decade, Cisco has been tracking and projecting global Internet
[Term of the Day]: Managed Service Provider
Term of the Day “Managed Service Provider” Definition — What is MSP? A managed service provider (MSP) is an organization that manages IT services for other companies. Managed services are responsible for hosting and then managing servers, specialized applications, and networks for the clients. In most situations, Managed services provider owns the entire physical back-end infrastructure and also provides resources to their clients. All these operations are remotely performed over the internet
[Term of the Day]: Caching
Term of the Day “Caching” Definition — What is Caching? Caching is the process of storing copies of files in a cache, or temporary storage location so that they can be accessed more quickly. A common use is to store information in a web browser. The cache contains information stored by a Web Browser on your hard disc so that you don't have to download the same material repeatedly from a remote computer. Browsers keep copies of all the Web pages that you view so that the pages can be redisplayed
[Term of the Day]: Automatic Call Distributor
Term of the Day “Automatic Call Distributor” Definition — What is ACD? Automatic Call Distribution or (ACD) is a tool commonly used in the telephony industries like Call centers and BPO's. ACD intelligently routes incoming calls to the appropriate representatives or agents based on your business goals. The process works based on predetermined conditions, a set of rules or criteria used as instructions for routing incoming calls. ACD not only has the intelligence to route the calls it also
[Term of the Day]: Chief Data Officer
Term of the Day “Chief Data Officer (CDO)” Definition — What does Chief Data Officer (CDO) mean? The Chief Data Officer (CDO) is a senior executive within an organization who oversees a range of data-related functions that may include data management, ensuring data quality and creating data strategy. That data could be customer data, data gathered from Internet of Things (IoT) sensors, social media, structured, or unstructured data; anything that the organization gathers itself or buys in from
[Term of the Day]: ISMS
Term of the Day "ISMS" Information Security Management System (ISMS), is a framework that holds a set of policies and procedures to safeguard the sensitive data of an organization. The primary goal of ISMS is to ensure the business continuity by pro-actively limiting the security breaches or sudden impacts or any risks affecting business. ISO 27001 standards are developed by ISO and International Electrotechnical Commission (IEC). It outlines the criteria that businesses can follow to maintain the
[Term of the Day]: DMZ
Term of the Day "DMZ" DMZ in computer networks referred to as "Demilitarized Zone" it's designed to protect an organization’s internal network (such as a LAN) from the untrusted public network, commonly the Internet. It acts as a perimeter network ( which can be either a physical or logical subnet) and secures the internal network from the external network. DMZ allows servers to provide services to both the external and internal networks. All services accessible to users on communicating from an
[Term of the Day]: Virtualization
Term of the Day “Virtualization” Definition — What is Virtualization and it does? Virtualization is a technology that creates a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments. It is a software that looks and behaves like hardware to create an abstraction layer over computer hardware that allows the hardware elements of a single computer processor, memory,
[Term of the Day]: BPO
Term of the Day “BPO" Definition — What is a BPO? BPO is an acronym for Business Process Outsourcing, also sometimes referred to as IT-enabled services, or ITES. It's the business practice where a company outsources a part of its operations to a third-party company or some external service provider so that it can focus more on its core business activities. The services may include accounting, payroll, HR, IT services, telemarketing, social media marketing, and more. Basically, BPO fills the supplementary
[Term of the Day]: VPN
Term of the Day “Virtual Private Network” Definition — What is a VPN and its purpose? Virtual Private Network, better known as a VPN, is an encrypted connection over the Internet from a device to a network. This encrypted connection ensures that sensitive data is safely transmitted by preventing unauthorized people from snooping on the traffic and allows the user to conduct work remotely. VPN technology is widely used in corporate environments. It connects business networks together securely
[Term of the Day]: Sandbox
Term of the Day “Sandbox" Definition — What is a Sandbox? Literally, a Sandbox is a play tool, used in beaches. Children play with sandboxes and experience various forms of sand structures. Today, the meaning of this word has evolved. In the context of the IT environment. The sandbox is an isolated testing environment that allows users to test something depending on their organization's goals before it is deployed on a live/production environment. Sandbox technology is most commonly used in security testing
[Term of the Day]: ITOM
Term of the Day “IT Operations Management” Definition — What is ITOM and why do you need it? IT has become the backbone of all business operations. IT operations management (ITOM) is the administrative area involving technology infrastructure components and the requirements of individual applications, services, security, networking, storage and connectivity elements within an organization. ITOM has become crucial to every business as it helps optimize the delivery and maximize the quality of
[Term of the Day]: Timesheet
Term of the Day “Timesheet” Definition — What is Timesheet? Timesheet is a time management tool to record the amount of time a user or member of an organization has spent at work, on a particular task or project or activity. This information could be recorded on paper, a spreadsheet, or in software. The implementation of timesheets may vary based on business need, both time tracker (timesheet) and attendance tracker may sound similar, it doesn't mean they both are the same in function.
[Term of the Day]: IAM
Term of the Day “Identity and Access Management” Definition — What is IAM and it does? An acronym for Identity and Access Management, also called identity management (IdM) is a framework of policies and technologies that enables the right individuals to access the right resources at the right times for the right reasons. It is a way to tell who a user is and what they are allowed to do. IAM is like the bouncer at the door of a nightclub with a list of who is allowed in, who isn't allowed in,
[Term of the Day]: Proxy Server
Term of the Day "Proxy Server" Definition — What is a Proxy server? One of the most interesting and prominent internet-related technologies is the Proxy Server. A proxy server is a computer/server on the web that redirects your web browsing activity. It provides various functionality, security, and privacy depending on your needs, or company policy. How Does a Proxy Server Operate? The proxy server acts as a mediator server isolating users from the sites they peruse. When users send a web request
[Term of the Day]: Personally Identifiable Information
Term of the Day “Personally Identifiable Information” Definition — What is PII and its purpose? Personally Identifiable Information (PII) - Is any information (eg: Passport information) that permits to uniquely identify, contact or locate an individual, or can be used in a tandem with other relevant data (e.g., date of birth and race) to uniquely identify a person. The concept of PII has become prevalent as information technology and the Internet has made it easier to collect PII leading to a
[Term of the Day]: Thin Client
Term of the Day “Thin Client” Definition — What is Thin Client? The Thin Client is a lightweight computer, sometimes called a lean client. Thin Clients are viable alternatives to regular PCs. It may have very limited resources of its own. They do not have hard drives, auxiliary drives, and I/O ports. Since they do not have hard drives, thin clients do not have any software installed on them. Instead, they run programs and access data from a server. Significance of Thin Clients: Thin Clients are
[Term of the Day]: Firewall
Term of the Day “Firewall” Definition — What is a Firewall and it does in a network? A firewall is a software or hardware or can be a combination of both that acts as the first line of defense in a network. It monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. It prevents unauthorized access to a network by establishing a barrier between secured and controlled internal networks that can be trusted and
[Term of the Day]: Ticket Filters
Term of the Day “Ticket Filters” In a Helpdesk environment, Technician ( ticket handlers) needs a simple tool that could provide ease in handling and managing tickets in large numbers. Ticket Filter provides the ability for technicians to handle tickets in various structured views. In general ticket view section for users comes with built-in filters to view Unassigned, Open, On-hold, Closed tickets, etc. Technicians can create customized filters to have tickets views based on the ticket type (incident
[Term of the Day]: Two Factor Authentication (TFA)
Term of the Day “Two Factor Authentication” Definition — What is TFA and why is it important? Two-factor authentication, also known as 2FA, is a security mechanism in which individuals are authenticated through more than one required security and validation procedure. It adds an extra step and an additional level of security to safeguard your accounts from being hacked. An instance of how 2FA works, just look at your own online history: There might be plenty of websites that you access just by
[Term of the Day]: Failover
Term of the Day “Failover” Failover is the ability to automatically switch to a reliable backup system, database, server or network, when the primary system fails with unpredicted system or component failure. Failover is an integral part of any business disaster recovery plan, the failover process involves the heartbeat sensing mechanism, which sends a signal between the primary and secondary (backup) devices. The heartbeat signal is usually configured for a predefined amount of time. Whenever the
[Term of the Day]: Phishing
Term of the Day “Phishing” Definition — What is Phishing? Phishing is a cybercrime of deceiving people into sharing sensitive and confidential information. The term ’phishing’ is derived from the word fishing, because criminals are setting out hooks to "fish" for usernames, passwords, credit card information, network credentials, and so on from the "sea" of the Internet users. This attack is usually done by posing as a legitimate individual or organization via phone or email, cyber attackers
[Term of the Day]: HelpDesk Report Tool
Term of the Day “Helpdesk Report Tool” Helpdesk Report Tool connects to the database of the application gets the data for every module and presents the data in a meaningful way to users. The tool extracts and displays the data in charts, graphs, tables, and other visualization formats. Report tools are highly sophisticated and developed in collaboration with businesses of various sizes. RT will be suitable for any type of business which requires reporting features and data analysis, allowing managers,
[Term of the Day]: HTML
Term of the Day “Hypertext Markup Language” Definition — What is HTML and its purpose? HTML is an acronym that stands for Hypertext Markup Language. It is the standard markup language for creating Web pages and describes the structure of a Web page. HTML consists of a series of elements that tell the browser how to display the content. When working with HTML, simple code structures (tags and attributes) are used to mark up a webpage. For example, we can create a paragraph by placing the enclosed
Next Page