Glossary

You probably knew this but just in case………

Tutela

Tutela is a Latin word that means “protection, guardianship, or safeguarding.”

Circular Economy

The circular economy is an economic system that aims to minimise waste and resource consumption by maximising the use, reuse, and recycling of materials. It advocates for shifting from the traditional linear model of production and consumption (take-make-dispose) to a more sustainable and regenerative model.

In the IT industry, the circular economy can be implemented in several ways:

Design for durability and longevity: Creating IT products that are built to last and withstand upgrades or repair rather than becoming quickly outdated and disposable.
Repair, refurbishment, and reuse: Encouraging the repair and refurbishment of IT equipment, extending their lifespan and reducing the need for new manufacturing. This involves initiatives like repairing or upgrading hardware components, replacing batteries, or software updates.
Recycling and proper disposal: Establishing proper recycling systems to recover valuable materials from discarded IT devices. This involves separating components, recovering valuable metals, and ensuring responsible disposal of hazardous materials.
Sharing and collaboration: Promoting the sharing of IT resources, such as cloud computing or software licences, to maximise their use and minimise the need for individual ownership.
Remanufacturing: Repurposing IT products or components for new uses. For example, old server hardware can be repurposed into data storage solutions, extending the life of the components.
E-waste management: Implementing responsible e-waste management practices to ensure safe and environmentally friendly disposal of IT devices. This involves working with certified e-waste recycling companies to ensure proper dismantling, recycling, and disposal processes.
The circular economy in the IT industry can drive innovation, reduce environmental impact, and create economic opportunities by turning waste into valuable resources, promoting a more sustainable and efficient use of materials, and reducing reliance on finite resources.

Sustainability


Sustainability refers to the practice of using resources and conducting activities in a way that avoids depletion or damage of natural resources and ensures the long-term well-being of the environment, society, and the economy.

In the IT industry, sustainability involves applying strategies and adopting technologies that minimise the industry’s negative impact on the environment. Here’s how it works:

Energy Efficiency: The IT industry focuses on reducing energy consumption by optimising data centres, servers, and network infrastructure. This includes using energy-efficient hardware, adopting virtualization techniques, and implementing energy management systems.
Renewable Energy: Increasingly, IT companies are transitioning to renewable energy sources such as solar and wind power to minimise dependence on non-renewable energy sources like fossil fuels. They may also pursue renewable energy procurement agreements and invest in on-site renewable energy generation.
E-waste Management: Given the rapid pace of technological advancements, electronic waste (e-waste) is a significant concern. IT companies strive to minimise e-waste by implementing recycling programs, extending product life cycles, and creating repair and reuse initiatives.
Sustainable Supply Chain: IT companies encourage suppliers to follow sustainable practices by prioritising environmentally friendly materials, labour rights, and fair trade. They work towards responsible sourcing and waste reduction across the entire supply chain.
Green Software Development: Software developers play a role in sustainability by creating efficient code that minimises resource consumption. This includes optimisation algorithms, reducing data storage requirements, and incorporating power-saving features in applications.
Telecommuting and Virtual Meetings: The use of telecommuting and virtual meetings reduces travel and associated carbon emissions. IT companies promote remote work and video conferencing to minimise the environmental impact of commuting and business travel.
Data Center Optimization: Data centres are one of the biggest energy consumers in the IT industry. Efforts are made to optimise cooling systems, improve server utilisation rates, and implement energy-saving technologies to reduce environmental impact.
Environmental Reporting: IT companies are increasingly transparent about their sustainability efforts through regular reporting. They disclose their environmental performance, set goals for improvement, and seek feedback from stakeholders to drive continuous progress.
By implementing these sustainability measures, the IT industry aims to reduce its carbon footprint, conserve natural resources, and contribute to a more sustainable future.

Device as a Service

Device as a Service (DaaS) is a subscription-based model that provides businesses with a comprehensive solution for obtaining, managing, and maintaining their IT devices. It is a service offering where a provider takes care of the entire lifecycle of devices, from procurement to deployment, management, and support.

In the IT industry, DaaS works by allowing businesses to outsource their device procurement and management to a service provider. Instead of purchasing devices upfront, businesses enter into a subscription agreement with the provider, paying a regular fee based on the number and type of devices required.

Here’s how DaaS typically works in the IT industry:

Device Selection: Businesses work with the service provider to choose the desired devices (laptops, desktops, tablets, etc.), considering their specific needs, performance requirements, and budget.
Device Deployment: The service provider procures the devices, install necessary software and configurations, and delivers them to the business or end-users ready-to-use. They also ensure proper asset tagging and inventory management.
Device Management: The provider takes care of ongoing device management tasks, including monitoring, patch management, security updates, device customization, and software distribution. They also remotely troubleshoot and resolve issues as needed.
Support and Maintenance: The service provider offers technical support services, either through a helpdesk or on-site support, ensuring prompt response and quick issue resolution. They handle repairs, replacements, and upgrades to avoid disruptions.
Refresh and Disposal: As devices reach the end of their life cycle, the provider manages the upgrade or replacement process, ensuring businesses always have up-to-date devices. They also handle secure data wiping and proper disposal in compliance with environmental regulations.
Overall, DaaS provides businesses with a simplified and cost-effective approach to managing their IT device infrastructure. It helps improve efficiency, reduces IT administrative burden, ensures device performance and security, and enables businesses to stay up-to-date with the latest technology without significant upfront investments.

Cloud Computing

Cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. Typically, businesses use cloud computing services from a third-party provider who owns and manages the infrastructure, while users access the services via the internet. This allows companies to avoid the need to maintain their own IT infrastructure and instead use a shared pool of computing resources that can be rapidly provisioned and scaled up or down as needed.

Virtualisation

Virtualization is a technology that enables the creation of one or more “virtual” versions of a computing resource, such as a server, storage device, operating system, network, or application. These virtual versions operate independently of the underlying physical resource and can be used to run multiple operating systems or applications on a single physical server or computer. Virtualization is primarily used to enhance the efficiency of computing resources, reduce hardware and energy costs, simplify management, and increase scalability and flexibility. It is used extensively in data centres, cloud computing, and other IT environments.

Hardware Pre-Staging

Hardware pre-staging is the process of configuring and preparing new hardware, such as servers or workstations, before deployment. This includes setting up hardware configurations, installing software and applications, configuring network settings, and performing necessary updates and patches. This can help streamline the deployment process and ensure that the hardware is ready to use as soon as it is deployed, saving time and minimising potential issues or downtime.

IT Relocations and Migrations

IT Relocations and migrations refer to the processes involved in moving IT infrastructure, systems, and applications from one physical location to another or transferring them to a different technology platform. These processes are critical for businesses that need to upgrade their technology systems, expand their operations, or relocate their offices.

IT relocations typically involve moving hardware, such as servers, switches, and routers, as well as software and data residing on these systems. IT migrations, on the other hand, involve moving applications and data between different platforms or versions of software.

IT Asset Disposal

IT Asset disposal (ITAD) refers to the process of properly disposing of electronic devices and equipment that are no longer in use or obsolete. This involves disposing of them in an environmentally-friendly and secure way, either by recycling or by erasing all data from the devices before they are discarded. The aim of ITAD is to minimise the potential environmental and security risks posed by obsolete IT equipment, including data breaches, identity theft, and pollution. ITAD is particularly important in organisations that handle large volumes of sensitive data, such as banks, healthcare providers, and government agencies, which need to ensure that their data assets are securely disposed of.

GreenLake

Hewlett Packard GreenLake is an as-a-service platform offered by Hewlett Packard Enterprise (HPE). It is a consumption-based IT model that allows organisations to access and utilise HPE’s infrastructure and software solutions on a pay-per-use basis.

GreenLake provides a flexible and scalable way for businesses to manage their IT needs without having to invest in and maintain their own hardware and software infrastructure. With GreenLake, businesses can leverage HPE’s expertise and resources to access and deploy infrastructure and software solutions quickly and easily. It offers a range of services, including compute, storage, networking, and data protection, among others.

HPE GreenLake is designed to help businesses optimise their IT spending, increase agility, and simplify the management of their IT infrastructure. It provides a cloud-like experience, allowing organisations to scale their resources up or down as needed without having to invest in excess capacity. Additionally, GreenLake offers options for on-premises, edge, and colocation deployments, providing businesses with flexibility and control over their IT infrastructure.

Overall, Hewlett Packard GreenLake enables organisations to focus on their core business activities while leveraging HPE’s technology and services to meet their IT needs in a cost-effective and efficient manner.

Dell Apex

Dell Apex is a cloud-native infrastructure offering that provides an as-a-service experience for compute, storage, and network resources. It enables organisations to scale their IT resources quickly and easily, while also simplifying management and reducing costs. With Dell Apex, customers pay for what they use on a consumption-based pricing model.

HPE GreenLake v Dell Apex

HPE Greenlake and Dell Apex are both cloud-based, as-a-service solutions that provide users with flexible and scalable IT infrastructure. However, there are some differences between the two:

Vendor – HPE Greenlake is offered by Hewlett Packard Enterprise, while Dell Apex is offered by Dell Technologies.
Services – Both HPE Green Lake and Dell Apex offer a range of services including compute, storage, networking, security, and analytics. However, HPE Greenlake also offers services in the areas of management and optimization, while Dell Apex offers services in the area of data protection.
Flexibility – HPE Greenlake is known for its high level of flexibility, offering customers the ability to customise their configurations and only pay for what they use. Dell Apex, on the other hand, offers pre-defined configurations with less customization options.
Pricing – Both HPE Green Lake and Dell Apex utilise a pay-per-use model, however, HPE Greenlake has a reputation for being more expensive than Dell Apex due to its increased flexibility and broader range of services.
Support – Both HPE Greenlake and Dell Apex provide customers with 24/7 support, however, HPE Greenlake is known for providing more personalised support.

Hybrid Work

Hybrid work is a work model that combines remote work and in-person work. Essentially, it allows employees to work from home or any location outside of the office part of the time, while still coming into the office for certain tasks or meetings.

There are several different ways that hybrid work can be deployed:

Split-week model: This involves employees working from home for part of the week and coming into the office for the rest of the week. For example, an employee might work from home on Mondays and Fridays, and come into the office on Tuesdays, Wednesdays, and Thursdays.
Rotational model: This involves employees rotating between working from home and working in the office on a set schedule. For example, an employee might work from home for one week and then come into the office for the next week.
Flex-time model: This involves employees having flexibility in terms of when they work from home and when they come into the office. For example, an employee might be able to work from home whenever they need to, as long as they attend all necessary meetings in person.
Hybrid work can be deployed in many different ways, and the specific approach will depend on the needs of the company and the preferences of the employees.

Cyber Security

Cybersecurity refers to the practice of protecting electronic devices, networks, and sensitive information from unauthorised access, theft, damage, or disruption. It involves various technologies, processes, and practices that are designed to safeguard digital assets against cyber threats such as malware, phishing, hacking, and identity theft.

To protect yourself from cyber threats, you can take the following steps:

Use strong passwords and change them regularly.
Keep your software and operating system up-to-date with the latest security patches.
Use antivirus and anti-malware software to protect your devices.
Be cautious when clicking on links or downloading attachments from unknown sources.
Use two-factor authentication whenever possible.
Avoid using public Wi-Fi networks for sensitive activities such as online banking or shopping.
Backup your important data regularly.
Be aware of common cyber threats and stay informed about the latest security trends and best practices.

Internet-Based Networking

Internet-based networking refers to the use of the internet to connect devices and share information between them. It involves the use of protocols such as TCP/IP, HTTP, and DNS to enable communication between devices over the internet.

Internet-based networking can be deployed in several ways, including:

Virtual Private Networks (VPNs): These are secure connections that allow remote users to access a private network over the internet.
Cloud-based networking: This involves the use of cloud-based services to manage and control network resources and infrastructure.
Software-defined networking (SDN): This is a network architecture that uses software to manage and control network traffic, making it more flexible and scalable.
Internet of Things (IoT): This involves the use of internet-connected devices to collect and share data, enabling remote monitoring and control of devices and systems.
Overall, internet-based networking is a flexible and scalable way to connect devices and share information, making it a critical component of modern business and communication.

Internet of Things

Internet of Things (IoT) refers to the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and connectivity, which enables these objects to connect and exchange data. The IoT allows these devices to be remotely monitored, controlled, and optimised.

IoT is deployed through a combination of hardware, software, and networking technologies. The devices are equipped with sensors and other hardware components that collect data, which is then transmitted to a central server or cloud-based platform. The data is then analysed and processed using software applications that provide insights and actionable information. The networking technologies used for IoT include Wi-Fi, Bluetooth, cellular networks, and other wireless protocols.

IoT is deployed in various industries, including healthcare, manufacturing, transportation, and agriculture, among others. It is used to improve efficiency, reduce costs, and enhance the overall customer experience.

Multi Factor Authentication

Multi-factor authentication (MFA) is a security mechanism that requires users to provide two or more forms of authentication to gain access to a system or application. The goal of MFA is to increase the security of user accounts by adding an additional layer of protection beyond just a password.

MFA can be deployed in several ways, including:

Something you know: This is typically a password or PIN that only the user knows.
Something you have: This is typically a physical device, such as a smart card or token, that the user possesses.
Something you are: This is typically a biometric factor, such as a fingerprint or facial recognition, that verifies the user’s identity.
MFA can be implemented in various ways, such as through hardware tokens, software tokens, SMS-based authentication, biometric authentication, or smart cards. The deployment of MFA depends on the specific needs and requirements of the organisation or application.

Collaboration

Collaboration is the process of working together with one or more people or organisations to achieve a common goal. In the IT world, collaboration refers to the use of technology to facilitate communication and cooperation among team members, stakeholders, and partners.

Collaboration in the IT world can be deployed through various tools and technologies such as:

Project management software: This software helps teams to plan, organise, and track their work, assign tasks, and monitor progress.
Communication tools: These tools include email, instant messaging, video conferencing, and social media platforms that enable team members to communicate and share information in real-time.
Cloud-based collaboration tools: These tools allow teams to share files, documents, and data in a secure and centralised location, making it easier to collaborate and work together on projects.
Virtual collaboration tools: These tools enable teams to work together remotely, regardless of their location, by providing access to shared resources, virtual whiteboards, and other collaborative features.
Overall, collaboration in the IT world is essential for improving productivity, enhancing communication, and achieving better results.

EPP

EPP (Extensible Provisioning Protocol) is a protocol used for the management of domain names, contact information, and other services related to domain registration and management. It is an XML-based protocol designed by the Internet Engineering Task Force (IETF) to provide a secure and standardised method for domain registrars and registries to interact with each other. EPP enables domain registrars to manage their domain portfolios more efficiently and securely, and provides a standardised interface for domain owners to manage their domains directly with their registrars.

EDR

EDR stands for Endpoint Detection and Response. It is a type of cybersecurity technology that helps organisations monitor and respond to cyber threats on their endpoints (such as computers, servers, and mobile devices). EDR uses advanced behavioural analytics and machine learning algorithms to identify suspicious activity on endpoints and respond to them in real-time, helping organisations detect and prevent cyberattacks.

XDR

XDR (Extended Detection and Response) is a security solution that consolidates and correlates security data from multiple sources across an organisation, providing improved visibility and response to threats. It collects and analyses data from endpoints, networks, and cloud environments, and employs advanced analytics and machine learning techniques to identify and respond to threats in real-time. XDR provides a more comprehensive security strategy that can help organisations better detect, investigate, and respond to security incidents.

NoCaaS

NOCaaS stands for Network Operations Center as a Service. It refers to outsourcing network management and monitoring to a third-party service provider. This service allows businesses to delegate their network operations centre (NOC) responsibilities, such as monitoring network health, security, performance, and troubleshooting, to a remote team of experts without the need for costly investments in infrastructure and personnel. With NOCaaS, businesses can focus on their core competencies and leave the maintenance of their IT infrastructure to experts.

MDR

MDR stands for “Medical Device Regulation.” It is a set of regulations introduced by the European Union (EU) in 2017 that impact medical devices. It is intended to provide stronger safety controls for medical devices and increase the transparency of the approval process. The new regulations lay out stricter rules on the manufacturing, clinical testing, marketing, and post-market surveillance of medical devices, and place a greater emphasis on product safety and patient needs. They also establish a new European database to track medical devices and better inform patients and physicians about their safety and effectiveness.

SD-WAN

SD-WAN (Software-Defined Wide Area Network) is a networking technology that simplifies the management and improves the performance of wide-area networks (WANs) by separating the network hardware from its control mechanism using software. SD-WAN enables companies to connect their branch offices, data centres, and cloud environments through a centralised virtual network, providing improved network performance, security, and cost-effectiveness. The technology utilises multiple internet links, including broadband, 4G/LTE, and MPLS, for secure and reliable traffic routing and optimised network connectivity. SD-WAN also offers greater visibility and control over network traffic, making it easier for IT teams to manage their network infrastructure and identify and fix network issues.

SSE

SSE stands for Streaming SIMD Extensions. It is a set of instructions that are designed to improve the performance of multimedia and other data-intensive applications on the x86 architecture-based processors. SSE technology is integrated into Intel processors, including the Pentium III, Pentium 4, and more recent Intel processors. The extension allows processors to perform multiple calculations simultaneously and in parallel, offering enhanced processing speeds and improved performance for multimedia and other complex applications.

ZTNA

ZTNA stands for Zero Trust Network Access, which is a security model that requires all users, devices, and applications to be authenticated and authorised before being granted access to resources within a network. Unlike traditional network security models that rely on perimeter-based defences, ZTNA assumes that all devices and users are accessing the network from untrusted sources and verifies each access request before granting it. This approach reduces the risk of unauthorised access, data breaches, and cyber attacks, especially as enterprises shift more resources to the cloud and remote work environments.

SASE

SASE stands for Secure Access Service Edge. It is a network architecture model that combines software-defined networking and security services in a unified cloud-based platform. The concept of SASE focuses on delivering security services and network connectivity to users, regardless of their location, device, or network. It enables organisations to provide secure and optimised access to resources and applications through a single, integrated solution. SASE ensures that all network traffic is inspected and secured, while also optimising application performance and user experience. The primary goal of SASE is to simplify and streamline network security operations while ensuring cloud-based access is secure and always available.