Welcome to our IT Glossary. Here is a glossary of common IT terms from Qlic.
Analytics is the process of collecting, analysing and interpreting data to gain insights.
Anti-Virus & Malware Protection blocks malware and infections by identifying and preventing the handful of techniques and behaviours used in almost every exploit.
AI is the ability of machines performing tasks that typically require human intelligence, such as learning, problem-solving, decision-making.
AR is a technology that overlays digital information onto the physical world, enhancing the user’s perception and interaction with their environment.
Autotask is a leading IT Business Management software provider. It combines RMM, service desk, CRM, projects, time and billing and reporting into one unified platform. We’re happy to announce our recent partnership with Autotask, a leading IT business management software specifically for Managed Service Providers.
Azure Active Directory is a fully managed service from Microsoft that offers identity and access capabilities for applications running in Microsoft Azure and for applications running in an on-premises environment.
Big data refers to large volumes of structured and unstructured data that are too complex to process using traditional data processing methods.
Blockchain is a decentralised and distributed digital ledger that records transactions across multiple computers to create secure and transparent records.
Brightgauge is an online client reporting dashboard where you can view various aspects of your support tickets with your IT Provider. BrightGauge Client Reporting system offers a simple layout and automation of ticket data, enabling you to monitor support productivity on from a web-based dashboard.
Cloud computing services involves the delivery of computing services including servers, storage, databases, networking, software, analytics and more.
Cyber Essentials is a Government backed scheme that will help you to protect your organisation against a whole range of the most common cyber attacks.
Cyber security refers to the protection of computer systems, networks and sensitive data from unauthorised access, theft, or malicious attacks.
Data backup and recovery is the process of creating copies of critical data as well as storing them in secure locations to prevent data loss that can be due to system failures, human error, natural disasters, or cyber attacks.
Each year, millions of laptop computers are misplaced, stolen, or lost; many of them containing important and sensitive data. Full device encryption is the essential first line of defence to protect your data in any of these events.
DevOps is a set of practices that combines software development and operations to improve collaboration, automation and efficiency in the software development lifecycle.
Disaster recovery involves the planning and preparation of processes and procedures to recover all IT systems, applications and data in the event of human error, cyber breach or other disruptive events.
Edge computing is a distributed computing that enables data processing and analysis at the edge of the network, closer to the source of data, to reduce latency, increase efficiency and improve security.
Elementor brings a new set of tools to your WordPress website. It’s a drag-and-drop website builder will make the whole process of creating and managing a website both much easier and faster.
With email filtering, you can protect your cloud mailboxes against new, sophisticated attacks in real time. By protecting against unsafe attachments and expanding protection against malicious links, it provides advanced security features to provide better zero-day protection.
Endpoint security refers to the protection of end-user devices, such as desktops, laptops, smartphones and tablets from various security threats, including malware, viruses, and phishing attacks.
Exclaimer Cloud Signatures for Microsoft 365 is a multi-award-winning signature management service. It’s recommended to use Exclaimer Cloud Signatures for organisations to centrally manage professional Microsoft 365 signatures for all users sending email from any device.
Firewalls provide the ultimate network security with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks.
GDPR is a legal framework with guidelines for the collection and processing of personal information in the EU. It affects all organisations that hold personal data on EU citizens, regardless of where the organisation is based in the world.
Help desk support is the provision of technical assistance and troubleshooting to end-users who encounter technical problems with hardware, software or other IT services.
In-house IT support is having your own IT department or IT specialist inside your organisation.
IoT refers to the network of physical objects or “things” embedded with sensors, software and connectivity to collect and exchange data with other devices or systems over the internet.
IT consulting is expert advice and guidance on various IT-related matters, such as technology planning, budgeting, procurement, implementation and optimisation.
ML is a subset of AI that involves training machines to learn from data and improve their performance over time.
Managed hosting is a web hosting service in which the hosting provider manages and maintains the server infrastructure, including hardware, operating system, security and backups.
Managed print services involve outsourcing the management and maintenance of print infrastructure, including printers, copiers and scanners to a third-party provider.
Microsoft 365 provides you with access to your email and documents wherever you are, on any device. Microsoft 365 Hosted Exchange email provides industry-leading technology at a fraction of the cost, making Microsoft office 365 for charities the perfect option.
Multi-factor Authentication adds an extra layer of security, making the user authentication a two-step process which requires the user to prove their identity. In addition to passwords, users are expected to acknowledge a phone call/text message or mobile app notification to complete the verification process.
Network monitoring is essentially the process of regularly checking performance, availability and security of a computer network. It identifies and resolves issues before they cause downtime or service disruptions.
Network security involves implementing various measures to protect computer networks, devices and data from unauthorised access or other malicious attacks.
Onsite support involves dispatching IT technicians to the client’s location to diagnose and resolve technical issues that cannot be resolved remotely.
Outsourced IT Support is from a third-party managed service provider (MSP) outside of our company.
Patch management is the process of identifying, testing and applying software updates or patches to fix vulnerabilities and improve the performance of computer systems and applications.
Ransomware is the number one cyber attack affecting organisations today. It encrypts your files and holds them hostage until the ransom is paid, causing massive disruption to your charity’s productivity. Ransomware Protection prevents the malicious spontaneous encryption of data by ransomware—even trusted files that have been hijacked.
RMM is a software that enables IT service providers to remotely monitor, manage and support client devices, networks, and applications from a single console.
Remote support involves accessing and troubleshooting computer systems, networks, and applications from a remote location.
An SLA is a contract between a service provider and the customer that outlines the specific services, performance levels and responsibilities of both parties.
SharePoint Online for charities is a cloud-based solutions that allows users to easily access, share and manage files, folders and content, from any internet connected device. This empowers teamwork and seamlessly collaborate across the organisation.
SSL is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browser remain private.
The UniFi Enterprise Wi-Fi System is a scalable enterprise access point solution designed to be easily deployed and managed.
UX refers to the overall experience of a user when interacting with a product or service, including ease of use, functionality and aesthetic appeal.
UI refers to the visual and interactive elements of a product or service, including screens, buttons, menus and other design elements.
VR is a computer-generated simulation of an immersive environment that can be experienced through a headset or other devices.
WooCommerce helps you build an E-commerce store using WordPress. It takes that basic WordPress operating system and turns it into a fully-functioning E-commerce store.
WordPress is a Content Management System (CMS) for your website. It holds a commanding share of the web and is an easy to use CMS, has an intuitive interface and has vast availability of templates and plugins allowing complex functions to be integrated with ease.
Yoast is an SEO plugin available for WordPress. Yoast itself has received over a million downloads and when used correctly is guaranteed to improve your on-page SEO.