+90 850 433 6392

Glossary

ODYA IT Glossary allows all professionals in the industry to create and manage a common business dictionary.

A

Access Network

Access networks are the communication networks that link end-user devices (such as computers, smartphones and tablets) to a wide area network (WAN) like the internet. They enable access to business services such as cloud-based storage, video conferencing and software-as-a-service platforms

Access Node

An access code is a combination of letters and/or numbers used to gain entry to a particular system. While passwords are usually used alongside usernames, access codes can function independently of any specific user. In fact, multiple users may use the same access code to access a particular system or object without being identified as individual users

Access Server

A Network Access Server (NAS) is a device that facilitates remote logins to establish a Point-to-Point Protocol (PPP) connection. These devices are also known as Media Access Gateways or Remote Access Servers

Access Switch Router (ASR)

The network switches that connect the access layer with the subnets are called access switches. These switches are directly connected to multiple subnets that integrate with access devices such as routers, IP devices, control panels, and monitoring panels. The access layer of a hierarchical network typically includes several subnets

Active Application

A running application that is currently in use is known as an active application

Ad Hoc Network

It is not always necessary to have a centrally managed network to connect two computers. Instead, users can establish an ad hoc network between the two devices. They can communicate via an ethernet cable or wireless cards. However, it is important to note that this connection is only temporary

Appliance Server

A server appliance is a self-contained computer system designed for network use. It comes with pre-installed applications, and users can access its setup and configuration through a Web browser. It is also known as a “micro server” and can provide a variety of applications, such as file server, Web server, mail server, and firewall

Application Enabler

The Application Enabler is a tool that allows seamless integration between a business application screen and the relevant OnBase documents, content, and process management. Users have the option to view documents associated with their enabled screen in real-time without any clicks required, or they can access documents and processes with a simple mouse click or key press

Application Resource Management

Continuously analyzes the resource usage of the applications, while adhering to your business needs, it serves to provide the resources that the applications need for their performance with fully automated actions

Automated NOC

NOC automation is the application of automated processes by saving repetitive events from human intervention. It simplifies operations and makes NOC more efficient and effective as a monitoring and support engine

Automation

IT automation is software and systems to replace repeatable processes and reduce manual intervention. It helps to delivery IT infrastructure and applications by automating manual processes that required human interfrence

B

Back-End Application

A back-end program or application is responsible for supporting user services through front-end interfaces and connecting with necessary resources. It can either interact directly with the front-end or be accessed through an intermediate program that facilitates communication between the front-end and back-end activities

Backup

Backing up involves making copies of physical or virtual files or databases and storing them in a separate location to ensure that important data is not lost in the event of equipment failure or other disasters. This process is critical to the success of any disaster recovery plan

Backward Recovery

In database management systems (DBMS), recovery techniques are utilized to restore a database to a consistent state after any failure or error has occurred. The primary objective of these techniques is to maintain data integrity and consistency while preventing any data loss

Bottleneck

A bottleneck refers to a congestion point within a production system that causes delays or halts progress. Short-term bottlenecks are temporary and usually occur due to a shortage of labor. On the other hand, long-term bottlenecks are more integrated into the system itself and are identified by inefficient machinery or processes

Broadband (BB)

The term broadband refers to high-speed internet access

Buffer

A buffer is a tool for storing data to account for discrepancies in data flow or event timing when transmitting information from one device to another

Bug

Mistake

Bulk Data Transmission

Transferring large data files can be optimized through a software application feature called bulk data transfer. This process involves using data compression, blocking, and buffering to improve transfer rates

Bus topology

In a local-area network, the bus topology is a setup where every computer is linked to a central cable that channels data

Business Data Processing

Processing business data involves organizing and storing it in a way that enables easy analysis and retrieval in the future. Businesses gather vast amounts of data from various sources, which is then processed and transformed to meet specific application needs

C

Call

A call is an invitation to reach the relevant person after a malfunction in the system

Call Aborted

Call cancellation

Call Accounting

Call calculation

Call Admission Control (CAC)

call acceptance control

Call Agent (CA)

Technical support. It is the person who receives the incoming calls via the service desk

Call Blocking

Call barring

Client/Server Application

A program operating on a user’s device, such as a PC, Mac, or workstation

Cloud Computing

Cloud computing is a service that offers IT resources on demand via the Internet, with a pay-as-you-go model. Rather than purchasing and maintaining computer products and services, you can utilize a cloud computing service and avoid the hassle, cost, and time commitment of doing it yourself

Cloud‐Based Applications

Cloud applications are software that users can access primarily through the internet. This means that the software is managed by a server rather than being stored on the user’s local machine

Cluster

A cluster in a computer system is a collection of servers and resources that function as a unified system, providing high availability, load balancing, and parallel processing capabilities

Command

A command, also known as .CMD, is an assigned action for a program to complete a specific task. It typically involves using a specific word or phrase to instruct the computer on what action to take

Configuration

The arrangement of hardware and software components that make up a computer system is called configuration

Configuration Management

Installation management is the process of keeping systems such as computer hardware and software in the desired state. It also ensures that systems operate consistently with expectations over time. CM helps identify systems that need to be patched, updated, or reconfigured to fit the desired state. It is often used in conjunction with IT service management as defined by the IT Infrastructure Library (ITIL)

Configuration Management Database (CMDB)

A configuration management database is a file that contains all relevant information about the hardware & software components used in an organization’s IT services and the relationships between these components. The CMDB gives an organized view of the configuration data and offers the possibility to examine this data from any desired perspective

Container

Container. A standard software unit that packages the code and all its dependencies so that the application can run quickly and reliably from one computing environment to another

Content‐Centric Networking (CCN)

Content-Centric Networking (CCN) differs from the traditional Internet architecture by focusing on content rather than hosts. It enables direct addressing and routing of content, with endpoints communicating based on the name of the data, rather than IP addresses

Core Network

Core networks are designed to improve the efficiency and dependability of data communications over long distances and at a large scale

D

Dashboard

Device table, clipboard

Data

Stored in a computer consists of a series of binary digits, known as bits, which can have a value of either one or zero

Data Access

Data access refers to a user’s ability to access or retrieve data stored within a database or other repository. Users who have data access can store, retrieve, move, or manipulate stored data, which can be stored on a wide range of hard drives and external devices

Data Backup

Backing up data involves making a duplicate of the information stored on your system, which can be used to restore lost or damaged data. Additionally, backups can be used to retrieve previous versions of files that have been deleted from your system

Data Connection

Data Connection refers to any wired or wireless internet connection or network that enables a Customer to access the Facility from a device

Data Exchange

Data exchange involves converting data from a source schema into a target schema to ensure that the target data accurately represents the source data. This process enables the sharing of data between various computer programs

Data Logging

Data logging is the process of collecting and storing data in different systems or environments for a certain period of time. It includes monitoring various events. Simply put, it is the collection of data on a specific, measurable topic or topics regardless of the method used

Database Query

A database query is divided into an action query or a select query. A select query is a query that retrieves data from a database. Action query requests additional operations on data such as insert, update, delete or other forms of data manipulation

Dependency

Software dependency is a relationship between software components in which one component depends on another for proper operation. For example, if a software application uses a library to query a database, the application depends on that library

Dependency Maping

Dependency mapping is the process of collecting information about all your core app dependencies and presenting it in an easily understandable way

Dependent Event

Dependent events are those that rely on what happened before them. These events are impacted by the outcomes that occurred earlier, meaning that multiple events that depend on each other are referred to as dependent events. If one event is altered by chance, then it’s likely that another event will also be affected

Deployment

Distribution is the mechanism by which applications, modules, updates and patches are delivered from developers to users. The methods used by developers to create, test, and deploy new code will affect how quickly a product can respond to changes in customer preferences or requirements, and the quality of each change

Digitalization

It is the use of technology that automates manual tasks with technology support in business processes

Down Time

It refers to the period of time that a computer, application, website or IT system is unavailable, offline or inoperable

E

Edge Router

An edge router is a specific type of router that is positioned at the boundary of a network. Its purpose is to facilitate connections between an internal network and external networks

Edge Switch

An edge switch is a type of switch that acts as a connection point between two networks. Specifically, it links local area networks (LANs) used by end-users to the networks of Internet service providers (ISPs)

Embedded System

An embedded system is a specialized combination of hardware and software that is based on a microprocessor or microcontroller. Its main purpose is to carry out specific functions within a larger mechanical or electrical system

End Node

In a network, an end node refers to a peripheral unit or a primary designated unit. IT professionals and others use this term to identify a specific hardware component with its own role and properties within the network system

End User

A person or entity who uses or consumes the products or services of a business is known as an end user

Encoder

A data entry professional known as an encoder is responsible for organizing and maintaining information for their employer

Encryption

The act of transforming data or information into a code, primarily to ensure that it remains secure and inaccessible to unauthorized individuals

Enhancing

Development, Improvement

Enterprise Application

Enterprise applications are software platforms that manage all aspects of a company’s operations and streamline business processes

Enterprise Network

Enterprise network refers to the physical, virtual or logical connection of the organization’s users, devices, systems and applications

F

Facility

IT Facility is a complete management approach for a company’s IT infrastructure from a facilities perspective. While an IT specialist is responsible for ensuring that networked systems are functional, an IT facilities manager ensures that facilities provide support for those functions. To put it simply, an IT professional installs the server rack, whereas an IT facility manager ensures that the room in which it is located has adequate ventilation, temperature control, and air handling

File Server

A computer network’s central server that stores and manages data files is known as a File Server

Firewall (FW)

The firewall. It is a network security device that monitors traffic to and from your network. Allows or blocks traffic according to a defined set of security rules

G

Gate Array

Gate arrays are a specific design for printed circuit boards that provide more versatility, but can also lead to inefficiencies in certain situations. They are a crucial aspect of the infrastructure equation for physical circuit boards that power a wide range of hardware and devices

Gateway

A gateway is a crucial network node utilized in telecommunications to link two networks with different transmission protocols. It acts as an entry and exit point for a network, as all data must pass through or communicate with the gateway before being routed

Gate Keeper

A gateway is a crucial network node utilized in telecommunications to link two networks with different transmission protocols. It acts as an entry and exit point for a network, as all data must pass through or communicate with the gateway before being routed

H

Handover

Switching from one cell to another in a cellular network

Help Desk

Helpdesk. Software that provides project management with ticketing system

Hijacking

Domain attack, hijacking (system, domain and router)

Hijacking Attacking

Type of attack where the attacker hijacks an already established connection

Host Database

The Host Database contains the IPv4 addresses and host names of machines on your network

I

Inquiry

Inquiry is any process that has the purpose of increasing knowledge, resolving doubt, or solving a problem. They are simply management tools for evaluating the effectiveness of the actions of the Information Technology team

Interconnection Network

A physical or virtual communications link between two or more networks operated by different organizations or operated within the same organization but within different authorization boundaries

Incident

Event, malfunction. It refers to an unexpected event that interrupts the operational processes of the business or reduces the quality of a service

IT Support Level

Support levels including L0, L1, L2, and L3. Each support level performs tasks for specific incidents. The customer decides what the L0, L1, L2 and L3 levels will cover, based on the complexity type and priority predetermined in the contract

K

Kubernetes

Kubernetes, also known as K8s, is an open source system for automating the deployment, scaling and management of containerized applications

L

Latency

A measure of the responsiveness of a network, expressed as round-trip time. Time between initiating a network request and receiving a response

Leech

Unauthorized use of computer information, resources. Consuming resources, bandwidth or data from a website or network, often in an unethical manner

Legacy Application

Current Application. It is an old or outdated computer program still in use. Legacy applications can be difficult to maintain and support and may not be compatible with newer operating systems or hardware

Legacy Data

Current Data. We can define legacy data as electronic data that is understood only by, compatible with, or resides only on obsolete hardware or software. This means that old data contains everything that modern technology cannot open. Also, legacy data can only be used by a legacy system, which is a long-term and mission-critical system

Level Stability

Software stability refers to the ability of software to withstand and adapt to changes without causing any major disruptions or issues

Library

A data management system for documents that are often, but not required, organized in a hierarchy of “folders” and “drawers”

M

Maintenance

System maintenance. It reports the malfunctions of the system with the system health checks made at certain periods. Thus, it ensures that system malfunctions are corrected without affecting customer processes. All of these steps are carried out within the framework of Service Level Agreements optimized by our past experience

Malware

Malware specially designed to corrupt, damage or gain unauthorized access to a computer system

Managed Data Network Services (MDNS)

Guided data network services, managed data network services

Mapping

Data mapping is the process of matching fields from one database to another. It’s the first step to facilitate data migration, data integration, and other data management tasks. Before data can be analyzed for business insights, it must be homogenized in a way that makes it accessible to decision makers

Monitoring

To carefully watch and check the situation of IT systems in order to see is there any interruption

Monitoring as a Service

MaaS is a type of cloud computing delivery model that falls under the category of anything as a service. This framework is designed to make it easier to deploy monitoring functions for different services and applications within the cloud. The most common use case for MaaS is online state monitoring, where it keeps track of various aspects of applications, networks, systems, or instances that can be deployed in the cloud

Microservice

A microservice is a service-oriented application component that is narrow in scope, strongly encapsulated, loosely coupled, independently deployable, and independently scalable

Multitenancy

Multitenancy is a reference to the operating mode of the software in which multiple independent instances of one or more applications are running in a shared environment. Instances (tenants) are logically isolated but physically integrated

Multi-tenant

When a software application and its infrastructure serve multiple customers, it is known as multi-tenant. In this setup, each customer shares the same software and database. However, each tenant’s data is kept separate and cannot be accessed by other tenants

Multi Service Access Node

Multi-service access node. represents multiple service access points. Msan equipment offers high-speed and quality services such as audio, information, video and multimedia services. These devices include Dslam (Digital Subscriber Line Access Multiplexer) and Msan units

MySQL

The most popular open source database

N

Network Access Control

Network Access Control. Its main purpose is to provide control of network access, for this it controls the access of your end-to-end network; Allows or disables applications. No unwanted or unauthorized users can be included in your network infrastructure

Network Administration

Network management aims to manage, monitor, maintain, secure and service an organization’s network. Specific tasks and procedures may vary depending on the size and type of an organization

Network Analysis

Network analysis is a method of examining relationships between entities in a network. It involves analyzing the links or connections between entities, as well as the properties of the entities themselves

Network Operations Center

It is a central location where all infrastructure systems of an institution are monitored and managed 24/7. First line of defense against network outages and failures

NOC

Acronym for Network Operations Center

O

Object

Article. It consists of the state and the associated behavior. An object stores its state in fields and exposes its behavior through methods. Methods operate on the internal state of an object and serve as the primary mechanism for object-to-object communication. Hiding the internal state and requiring all interaction to be performed through an object’s methods is known as data encapsulation, which is a core principle of object-oriented programming

Object Database

Object database. It is a database management system in which information is represented in the form of objects as used in object-oriented programming

Overallocation

Overdeployment is a resource allocation error that occurs when an organization does not have enough resources to complete all assigned critical tasks within a given time frame. This misstep can also be called overcommitment or overscheduling

Overlay

Overlap, overlap. In a general computing sense, overlay means “the operation of transferring a block of program code or other data to main memory, replacing what is already stored”. Overlay is a programming method that allows programs to be larger than the computer’s main memory. An embedded system normally uses skins due to the limitation of physical memory, which is internal memory for a system-on-chip, and the lack of virtual memory facilities

Overrun

Overwork. In computing systems, an overflow occurs when a system receives too much demand, unable to process all the processes and threads that are taking place. IT professionals may refer to “CPU overflow” when the CPU cannot meet demand, or “interface overflow” when the OP crashes due to insufficient processing capacity

P

Patch

Patch management is the practice of deploying firmware, driver, operating system (OS), and application updates to your computing endpoints. Patch management is critical to keeping systems up-to-date, reducing attack areas, and ensuring employee productivity

Phishing

Scam to get password

Pipe

Data transmission line, communication line

Polling

It refers to the process of repeatedly sampling the state of external devices by a client program. The term polling is often used when describing input/output and is referred to as software-driven I/O or polled I/O. This process can happen thousands of times per second

Polling Engine

Polling engine is the component that controls network polling

Proactive Monitoring

Proactive monitoring is generally about identifying potential problems in IT infrastructure and applications before users notice and complain, and initiate actions to prevent the problem from being noticed by the user and impacting the business. Alerts IT administrators of potential problems

Q

Query / Queries

Query(s) help you find and work with your data. A query can be a request from your database for data results, or a request for action on the data, or both. A query can give you an answer to a simple question, perform calculations, combine data from different tables, add, modify or delete data in a database

R

Request

Request, call. A service request in the IT field consists of a formal request made by the customer (user) to receive one of the services offered by the department. After the customer submits a service request, the IT department receives it in the form of a ticket and continues to provide it

Reactive Monitoring

Reactive monitoring detects errors after something goes wrong, takes action after the problem turns into a malfunction, and intervenes with customer notification

Router

A router is network equipment that transmits data frames between two computer networks using the same network protocols

S

Service Desk

Service Desk or help desk. Software that helps streamline and simplify processes to save time and increase efficiency to satisfy end-user requests

Service Visibility

Service visibility. It allows you to see critical relationships between infrastructure and business services so you can quickly find the causes of business service problems and resolve them quickly. Meet SLAs more consistently, prevent unintended consequences of IT change. Helps you quickly prioritize IT issues

Switch

Connecting devices in a network is made possible by switches, which allow them to communicate by exchanging data packets. These switches can either be hardware devices that manage physical networks or software-based virtual devices

Systems Management

Systems administration is the management of the systems of IT teams in a corporate network or data center. An effective systems management plan facilitates the delivery of IT as a service and enables an organization’s employees to respond quickly to changing business needs and system activity

T

Terminal

A device that communicates with a computer, combining a keyboard and display. Terminals are divided into different classes depending on whether they can process data on their own

Ticket

It is a customer service tool that helps ODYA Technology to manage support requests from customers. With this system, customer support requests are collected, these requests are prioritized according to their own metrics and a more efficient customer experience is created

V

Virtualizaton

Allows you to generate virtual versions of servers, storage, networks, and other physical machines. Special software imitates the operations of physical hardware, enabling you to run several virtual machines concurrently on a single physical machine

Void

When defining a method or local function, using “void” as the return type signifies that the method does not return any value

Z

Zero Trust Security

Zero Trust requires organizations to trust no one and instead authenticate and authorize every access request to their apps and data

Glossary