A computer or software system that provides resources, data, or services to other computers or devices on a network.
You will find this term commonly used in Networking
A group of computer servers used for IT purposes that are co-located in one or more data centers, used to provide redundancy and efficient processing.
You will find this term commonly used in Networking, Cloud Computing
The partitioning of a physical server into multiple virtual servers, allowing multiple operating systems and applications to run independently on a single hardware platform.
You will find this term commonly used in Virtualization, General IT
Refers to operations that are performed by the server in a client-server relationship in computer networking.
You will find this term commonly used in Web Development
An architectural pattern where computing resources are provided as scalable cloud services, allowing developers to build and run applications without managing servers.
You will find this term commonly used in Cloud Computing, Serverless Computing
Serverless computing, also known as function as a service (FaaS), is a cloud computing model where cloud providers dynamically manage server resources, allowing developers to focus on writing and deploying code without managing servers.
You will find this term commonly used in Cloud Computing, Software Development
A method used in microservices architectures to detect the location of services running in a network in order to facilitate communication between services.
You will find this term commonly used in Networking, Microservices
A distributed systems platform that makes it easy to package, deploy, and manage scalable and reliable microservices and containers.
You will find this term commonly used in Cloud Computing, Microservices
A contract between a service provider and a customer that outlines the expected level of service.
You will find this term commonly used in General IT
A dedicated infrastructure layer for facilitating service-to-service communications between services or microservices, using a transparent proxy.
You will find this term commonly used in Networking, Microservices
A standard interface for service meshes on Kubernetes. It defines a set of common, portable APIs.
You will find this term commonly used in Networking, Cloud Computing
Service-Oriented Architecture (SOA) is a software design approach where applications are composed of interoperable services that can be accessed and combined as needed to fulfill specific business requirements and processes.
You will find this term commonly used in Software Architecture, Integration, Enterprise Systems
A signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video and messaging applications.
You will find this term commonly used in Networking, Telecommunications
A family of cryptographic hash functions designed by the National Security Agency (NSA) to ensure data integrity.
You will find this term commonly used in Security, Cryptography
A technology included in Microsoft Windows that allows taking manual or automatic backup copies or snapshots of data.
You will find this term commonly used in Data Management, Operating Systems
The use of information technology systems, devices, software, applications, and services without explicit IT department approval.
You will find this term commonly used in Security, Cybersecurity
A type of database partitioning that separates very large databases the into smaller, faster, more easily managed parts called data shards.
You will find this term commonly used in Software Development, Database Management
A type of web hosting service where many websites reside on one web server connected to the Internet, making it a cost-effective option for hosting.
You will find this term commonly used in General IT, Web Hosting
A web-based collaborative platform that integrates with Microsoft Office. Primarily sold as a document management and storage system.
You will find this term commonly used in Software, Collaboration Tools
A user interface for accessing an operating system's services and functions, often through a command-line interface.
You will find this term commonly used in Operating Systems, General IT
A computer program designed to be run by the Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scripting languages.
You will find this term commonly used in Software Development, System Administration
A set of tools and services offering a holistic view of an organization’s information security, providing real-time analysis of security alerts generated by applications and network hardware.
You will find this term commonly used in Security, Cybersecurity
The analysis, interpretation, and manipulation of signals. Signals of interest can include sound, electromagnetic radiation, images, and sensor readings.
You will find this term commonly used in AI, Data Science
A method used in antivirus software to identify malware by comparing the contents of a file to a database of known malware signatures.
You will find this term commonly used in Cybersecurity
A class of parallel computers in Flynn's taxonomy, it describes computers with multiple processing elements that perform the same operation on multiple data points simultaneously.
You will find this term commonly used in General IT, Parallel Computing
A probabilistic technique for approximating the global optimum of a given function. Specifically, it is a metaheuristic to approximate global optimization in a large search space.
You will find this term commonly used in AI, Optimization Algorithms
Single sign-on (SSO) is an authentication process that allows users to access multiple applications or systems with a single set of login credentials, enhancing security, user experience, and productivity while reducing password fatigue.
You will find this term commonly used in Security, Identity Management, Authentication
A web application or website that interacts with the user by dynamically rewriting the current page rather than loading entire new pages from the server.
You will find this term commonly used in Web Development
An operating system intended for use on a computer or device that will only have a single user at any time.
You will find this term commonly used in Operating Systems
A signaling protocol used for initiating, maintaining, managing, and terminating real-time sessions that involve video, voice, messaging, and other communications applications and services.
You will find this term commonly used in Networking, Telecommunications
The use of voice over IP (VoIP) to facilitate the connection of a private branch exchange (PBX) to the internet.
You will find this term commonly used in Networking, Telecommunications
A discipline that incorporates aspects of software engineering and applies them to infrastructure and operations problems to create scalable and highly reliable software systems.
You will find this term commonly used in Software Development, DevOps
A type of VPN connection that is created between two separate locations, allowing multiple users in one location to connect to multiple users in another.
You will find this term commonly used in Networking, Security
A contract between a service provider and its customer that documents what services the provider will furnish.
You will find this term commonly used in IT Management, General IT
A proprietary business communication platform developed by Slack Technologies.
You will find this term commonly used in Communication, Collaboration
A technique used by robots and autonomous vehicles to build up a map within an unknown environment while at the same time keeping track of their current location.
You will find this term commonly used in AI, Robotics
A lawsuit that is intended to censor, intimidate, and silence critics by burdening them with the cost of a legal defense until they abandon their criticism or opposition.
You will find this term commonly used in Legal, Digital Rights
A specific measure of some aspect of the level of service that is provided, often used in the context of SRE to track the performance of a service.
You will find this term commonly used in General IT, DevOps
In networking, particularly with 5G networks, slicing is the ability to partition certain aspects of the network for specific customer or service requirements.
You will find this term commonly used in Networking, Telecommunications
The act of creating multiple virtual networks on top of a single physical 5G network infrastructure, each slice designed to meet different requirements.
You will find this term commonly used in Networking, Telecommunications
A key element of a service level agreement (SLA) between a service provider and a customer, specifying the level of service expected from the service provider.
You will find this term commonly used in General IT, Service Management
Self-executing contracts with the terms of the agreement between buyer and seller directly written into code.
You will find this term commonly used in Blockchain, General IT
An electrical grid which includes a variety of operation and energy measures including smart meters, smart appliances, renewable energy resources, and energy efficient resources.
You will find this term commonly used in Networking, Energy Management
A mobile phone with advanced features such as internet access and applications.
You will find this term commonly used in General IT
The use of social media platforms and websites to promote a product or service.
You will find this term commonly used in General IT, Marketing
A method of processing in which several processors are connected to a single operating system and share computational tasks for improved performance.
You will find this term commonly used in General IT, Computing
A protocol used for sending email messages between servers.
You will find this term commonly used in Networking, General IT
The process of transferring an email from one server to another for delivery.
You will find this term commonly used in Networking, Email Systems
Simple Network Management Protocol, used for monitoring and managing network devices.
You will find this term commonly used in Networking
An Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
You will find this term commonly used in Networking, Network Management
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Start for only $1. Unlock endless learning opportunities with over 2,600 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.