July 7, 2017

iTecs Terminology Explained

Brief Glossary of terminology whilst using ITECS services

Below we list some of our terminology to help you understand our products, services and general lingo.

Legend:*  Words used primarily in the field during the course of providing services.

  • BBB A+:  Better Business Bureau A plus rating - link here
  • BDR: Backup and Disaster Recovery
  • Certified Experts: Specialists within our organization who have passed exams and received certifications; e.g. MTA, MSCE, EMC, CCDA, VCP6-NV, CTIAsec
  • Client: Business entity, partner or person who engages iTecs for IT related services - link here
  • * Client: A computer or software application that is part of a client's network - link here
  • Consulting: Advising businesses on how to leverage technology to better suite their business needs - link here
  • Database: Software that serves as a repository for information; e.g. MySQL, Microsoft SQL Server, Oracle - link here
  • Debian: A free Linux operating system with over 51,000 packages - link here
  • DRaaS: Acronym for Disaster Recovery as a Service - link here
  • Fixed Fee: Services provided to a client for a flat monthly fee - link here
  • * Hosed: Computer, device or software that is corrupt, broken, or damaged beyond repair - link here
  • Hourly: Services provided to a client on a per hour basis, usually associated with on-demand IT support - link here
  • Linux: A very stable and dependable operating system mainly used as servers with various roles - link here
  • Managed Services Contract: Affordable fixed monthly fee, tailored to each client
  • OpenSUSE: A Linux operating system primarily used for server roles and application hosting -  link here
  • Redhat: A Linux operating system used mostly in enterprise networks as application hosting server - link here
  • Retainer Contract: Pre-purchased block of time that never expires and is used to provide clients IT services - link here

Latest Posts

January 7, 2021

Protecting Your Company Against Ransomware

Ransomware is becoming more common due to the success the creators are enjoying due to the improvement of their methods. What were once simple text-based phishing emails are becoming very realistic looking “corporate” fakes.

Read More
December 28, 2020

G Suite VS Office 365

G-Suite or Office 365 this is the question that has stumped small to medium-sized business owners for years. Now businesses are looking to move into the cloud and need to know where to start and who to use. Some of the most important factors to consider are security, integration, functionality, and usability.

Read More
November 12, 2020

Why You Should Use a Password Manager, and How to Get Started

The majority of people use weak or reuse passwords on different websites. How can someone use a complex, unique password on all of the websites and applications you use? The answer is a password manager.

Read More

You have questions, we have answers

What can we help you with?