Cloud Computing – The delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the internet (“the cloud”), offering flexibility and cost-efficiency.
SaaS (Software as a Service) – A cloud service model in which software applications are hosted and managed by a provider and made available to customers over the internet.
IaaS (Infrastructure as a Service) – A cloud computing service model that provides virtualised computing resources over the internet on a pay-as-you-go basis.
PaaS (Platform as a Service) – A cloud computing model that offers a platform allowing customers to develop, run and manage applications without the complexity of building and maintaining infrastructure.
FaaS (Function as a Service) – A cloud computing model where individual functions of an application are hosted and executed in a serverless environment, billed only for the compute time consumed.
Hybrid Cloud – A computing environment that combines on-premises infrastructure, private cloud services, and a public cloud, allowing data and applications to be shared between them.
Public Cloud – Cloud services offered by third-party providers over the public internet, available to anyone who wishes to purchase them.
Private Cloud – Cloud computing services dedicated to a single organisation, offering greater control and security through a customised environment.
Multi-Cloud – The use of multiple cloud computing and storage services in a single heterogeneous architecture, often from different providers to optimise performance or cost.
Virtualisation – The process of creating a virtual (rather than actual) version of something, such as a server or storage device, thereby increasing resource efficiency.
Containerisation – A lightweight form of virtualisation that packages an application and its dependencies in isolated units (containers) to ensure consistency across computing environments.
Kubernetes – An open-source platform designed to automate the deployment, scaling, and management of containerised applications.
Serverless Computing – A cloud computing model in which the cloud provider dynamically manages the allocation and provisioning of servers, enabling developers to focus on code rather than infrastructure.
Microservices – An architectural style that structures an application as a collection of small, independent services that communicate over well-defined APIs.
Edge Computing – A distributed computing paradigm that brings computation and data storage closer to the locations where they are needed, reducing latency and bandwidth use.
Big Data – Refers to extremely large datasets that can be analysed computationally to reveal patterns, trends, and associations, especially relating to human behaviour and interactions.
Data Analytics – The science of analysing raw data to make conclusions about that information, often through specialised systems and software.
Internet of Things (IoT) – The network of physical objects embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
Artificial Intelligence (AI) – The simulation of human intelligence processes by machines, particularly computer systems, used to perform tasks that normally require human intelligence.
Machine Learning (ML) – A subset of AI focused on building systems that learn from data, identify patterns, and make decisions with minimal human intervention.
Deep Learning – A specialised area within machine learning using neural networks with many layers to analyse various factors of data, often used for complex tasks like image and speech recognition.
Blockchain – A decentralized and distributed digital ledger that records transactions across many computers in a way that prevents alteration once recorded.
Virtual Private Network (VPN) – A technology that creates a secure, encrypted connection over a less secure network, such as the internet, to enable private communication.
Cybersecurity – The practice of protecting systems, networks, and programs from digital attacks, ensuring the confidentiality, integrity, and availability of data.
Encryption – The method of converting information or data into a code, especially to prevent unauthorized access.
Identity and Access Management (IAM) – Frameworks and technologies for ensuring that the right individuals have the appropriate access to technology resources.
Zero Trust Security – A security concept that assumes no implicit trust is granted to assets or user accounts based solely on their physical or network location; every access attempt must be verified.
DevOps – A set of practices and cultural philosophies that aim to improve collaboration between software development and IT operations teams to accelerate development and deployment.
Continuous Integration (CI) – The practice of merging all developers’ working copies to a shared mainline several times a day, improving software quality and reducing integration challenges.
Continuous Deployment (CD) – An approach in software development where code changes are automatically prepared for a release to production, ensuring faster delivery and frequent updates.
Agile Development – A methodology centred on iterative development, where requirements and solutions evolve through collaborative cross-functional teams.
ITIL (Information Technology Infrastructure Library) – A set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business.
Service Level Agreement (SLA) – A formal contract between a service provider and a client that defines the level of service expected, including performance metrics and responsibilities.
DRaaS (Disaster Recovery as a Service) – A cloud-based service that enables organisations to back up their data and IT infrastructure in a third-party cloud environment and recover it in the event of a disaster.
Cloud Storage – A model of data storage in which digital data is stored in logical pools, managed by a third-party provider and accessed over the internet.
Data Backup and Recovery – Processes and technologies used to create copies of data that can be restored in the event of loss or corruption.
Application Programming Interface (API) – A set of rules and protocols for building and interacting with software applications, allowing different systems to communicate with each other.
Software Development Kit (SDK) – A collection of software development tools in one installable package, which allows the creation of applications for a specific platform.
Low-code Development – A software development approach that requires little to no coding to build applications, using graphical user interfaces and configuration instead.
No-code Development – An approach to application development that enables non-technical users to create software through graphical interfaces without writing traditional code.
Business Intelligence (BI) – Technologies, applications and practices for the collection, integration, analysis, and presentation of business information to support better decision-making.
Data Warehouse – A central repository for integrated data from one or more disparate sources, used for reporting and data analysis.
Data Lake – A storage repository that holds a vast amount of raw data in its native format until it is needed for analysis.
Content Delivery Network (CDN) – A geographically distributed network of servers that work together to provide fast delivery of internet content by caching copies closer to users.
Load Balancer – A device or service that distributes network or application traffic across a cluster of servers to ensure reliability and performance.
DevSecOps – An approach that integrates security practices within the DevOps process, emphasising security as a shared responsibility among all participants.
Infrastructure as Code (IaC) – The management of infrastructure (networks, virtual machines, load balancers, etc.) in a descriptive model using code, enabling automated and scalable deployments.
Orchestration – The automated arrangement, coordination, and management of complex computer systems, middleware, and services in order to streamline processes and workflows.
Automation – The use of technology to perform tasks with minimal human intervention, improving efficiency and reducing errors.
Service Mesh – A dedicated infrastructure layer for facilitating service-to-service communications between microservices, ensuring smooth and secure interactions.
ChatOps – The integration of communication and operations tools (often via chat platforms) to facilitate collaborative problem-solving and real-time operational management.
Robotic Process Automation (RPA) – The use of software robots or ‘bots’ to automate highly repetitive, routine tasks traditionally performed by humans.
Legacy Systems – Outdated computing systems or applications that, although still in use, may lack integration capabilities with modern systems and technologies.
End User Computing – Solutions and technologies that empower users to access and control computing environments, often through desktop virtualization or remote applications.
Bring Your Own Device (BYOD) – A policy that allows employees to use their personal devices for work purposes, which can increase flexibility but may also introduce security challenges.
SaaSOps – Operational processes and tools for managing the multitude of SaaS applications that organisations adopt, ensuring security, compliance, and cost control.
FinOps (Cloud Financial Management) – The practice of bringing financial accountability to the variable spend model of cloud computing, enabling better cost optimisation and governance.
Observability – The ability to measure a system’s internal state by analysing its outputs, often using logs, metrics and traces to monitor performance and troubleshoot issues.
Log Management – The process of generating, storing, analysing, and managing log data from various sources within an organisation to support security and operational decisions.
Scalability – The capacity of a system to handle a growing amount of work or its potential to be enlarged in order to accommodate growth.
High Availability – A characteristic of a system that aims to ensure an agreed level of operational performance, usually uptime, even in the face of component failures.
Latency – The delay between a request and the corresponding response in a system, a critical factor in performance-sensitive applications.
Resilience – The ability of a system or network to recover quickly from disruptions, ensuring continuity of service despite failures or attacks.
Cloud Native – An approach to building and running applications that fully exploit the advantages of the cloud computing delivery model, often through microservices, containers, and continuous delivery.
Service-Oriented Architecture (SOA) – A design principle that organisational systems use to provide services to other components via a communication protocol, often over a network.
API Gateway – A server that acts as an intermediary for requests from clients seeking access to backend services, handling tasks such as routing, rate limiting and authentication.
Elasticity – The ability of a system to dynamically acquire and release resources to match changing workload demands, a key benefit of cloud environments.
Virtual Private Cloud (VPC) – A secure, isolated portion of a public cloud that is dedicated to a single organisation, offering enhanced control over its resources and networking.
Data Centre – A physical facility that organisations use to house their critical applications and data, including servers, storage systems and networking equipment.
Colocation – The practice of housing privately-owned servers and networking equipment in a third-party data centre, benefitting from robust infrastructure and security.
Hybrid IT – An environment that combines traditional on-premises IT with modern cloud-based services to create a more flexible and responsive computing ecosystem.
Managed Services – Outsourced IT services provided by a third-party provider, encompassing network, application, system, and management services.
IT Governance – The framework that ensures IT investments support business objectives, aligning IT strategy with business goals and managing risks and resources.
Regulatory Compliance – The process by which organisations ensure their IT systems and data handling practices adhere to laws, regulations, and industry standards.
Penetration Testing – An authorised simulated cyber-attack on a computer system or network to evaluate its security, identify vulnerabilities and determine potential impact.
Threat Intelligence – The collection and analysis of information about potential or current attacks that threaten an organisation, used to guide security decisions.
Security Information and Event Management (SIEM) – A comprehensive solution that provides real-time analysis of security alerts generated by applications and network hardware.
Cloud Migration – The process of moving data, applications, and IT processes from on-premises systems to a cloud environment, often to improve agility and cost-efficiency.
Legacy Modernisation – The process of updating and transforming outdated systems to leverage new technologies and architectures, improving performance, security, and scalability.
CapEx vs OpEx – A financial framework distinguishing between capital expenditure (CapEx, upfront investments in assets) and operational expenditure (OpEx, recurring costs), particularly relevant when evaluating cloud services.
Cloud Management Platform (CMP) – A suite of integrated tools that help manage, monitor, and govern multi-cloud environments, streamlining deployment and operations.
Multi-Tenancy – An architecture in which a single instance of a software application serves multiple customers (tenants), ensuring data isolation and cost efficiency.
Quantum Computing – An advanced computing paradigm that utilises quantum-mechanical phenomena to perform operations on data at speeds unimaginable with classical computers, although still largely experimental.
Software-Defined Networking (SDN) – An approach to networking that decouples the control plane from the data plane, making it easier to manage, configure, and optimise networks through software.
Network Function Virtualisation (NFV) – The abstraction of network services from proprietary hardware appliances to virtual machines, promoting scalability, flexibility and reduced capital expenditure.
Remote Desktop Services (RDS) – A service that allows a user to remotely access and work on a computer system or desktop environment from a different location over the internet.
Container Security – The practices and technologies used to secure containerised applications, including image scanning, runtime protection and secure configuration.
Edge Analytics – The processing and analysis of data at the edge of the network, near the data source, to reduce latency and bandwidth usage before sending summarised data to the cloud.
Digital Transformation – The integration of digital technology into all areas of a business, resulting in fundamental changes to how organisations operate and deliver value to customers.
Infrastructure Security – Measures and technologies to protect the physical and virtual components of IT infrastructure from threats, ensuring system integrity and availability.
Identity Federation – A system that allows the sharing of identity information across multiple organisations or domains to streamline access to interconnected systems.
Data Sovereignty – The concept that data is subject to the laws and governance structures within the nation in which it is collected or stored, which impacts cloud storage decisions.
General Data Protection Regulation (GDPR) – A comprehensive data protection law in the European Union that regulates the processing of personal data and imposes strict compliance requirements on businesses.
Virtual Desktop Infrastructure (VDI) – A technology that hosts desktop environments on a centralised server, enabling users to access their desktop remotely, usually through a thin client or web browser.
Application Modernisation – The process of updating older legacy applications to more current, cloud-friendly architectures, ensuring they remain secure, maintainable and scalable.
Incident Response – The procedures and practices undertaken to prepare for, detect, contain, and recover from security breaches or IT incidents.
Digital Twin – A virtual replica of a physical device, process, or system that is used to simulate, analyse and optimise performance using real-time data.
Log Aggregation – The process of collecting logs from multiple sources into a centralised platform for analysis, monitoring and troubleshooting.
Data Integration – The practice of combining data from different sources to provide a unified view, which is essential for analytics, reporting and decision-making.
IT Service Management (ITSM) – A strategic approach to planning, delivering, operating and controlling IT services in order to meet the needs of an organisation and its customers.