July 7, 2017

iTecs Terminology Explained

Brief Glossary of terminology whilst using ITECS services

Below we list some of our terminology to help you understand our products, services and general lingo.

Legend:*  Words used primarily in the field during the course of providing services.

  • BBB A+:  Better Business Bureau A plus rating - link here
  • BDR: Backup and Disaster Recovery
  • Certified Experts: Specialists within our organization who have passed exams and received certifications; e.g. MTA, MSCE, EMC, CCDA, VCP6-NV, CTIAsec
  • Client: Business entity, partner or person who engages iTecs for IT related services - link here
  • * Client: A computer or software application that is part of a client's network - link here
  • Consulting: Advising businesses on how to leverage technology to better suite their business needs - link here
  • Database: Software that serves as a repository for information; e.g. MySQL, Microsoft SQL Server, Oracle - link here
  • Debian: A free Linux operating system with over 51,000 packages - link here
  • DRaaS: Acronym for Disaster Recovery as a Service - link here
  • Fixed Fee: Services provided to a client for a flat monthly fee - link here
  • * Hosed: Computer, device or software that is corrupt, broken, or damaged beyond repair - link here
  • Hourly: Services provided to a client on a per hour basis, usually associated with on-demand IT support - link here
  • Linux: A very stable and dependable operating system mainly used as servers with various roles - link here
  • Managed Services Contract: Affordable fixed monthly fee, tailored to each client
  • OpenSUSE: A Linux operating system primarily used for server roles and application hosting -  link here
  • Redhat: A Linux operating system used mostly in enterprise networks as application hosting server - link here
  • Retainer Contract: Pre-purchased block of time that never expires and is used to provide clients IT services - link here

Latest Posts

September 8, 2021

How To Protect Crypto Exchange Accounts

Mitigate the chances that your crypto exchange accounts get hacked by following the tips below.‍You may have read articles of families losing their entire online Exchange accounts balances due to hackers breaching and stealing everything they own. Some of you may believe that the responsibility of these hacks is on the Exchanges, and I'm here to tell you this is usually not the case. Before you get angry, let me first explain the two types of hacks that occur that lead to you losing your entire investment.

Read More
July 16, 2021

Why End Point Detection (EDR) Offers Better Security

The rate at which new threats are being identified proves the inadequacy of traditional anti-virus software as a singular security measure. Considering its powerful and comprehensive threat-detecting abilities, SentinelOne proves to be a clear winner in any environment.

Read More
July 12, 2021

What is a Crypto Wallet and How to Secure it

There are various types of cryptocurrency wallets. The three prominent are offline, online, and those held by a custodian. Before we explain the differences between the three, it's important to note that a custodian, in this context, is an entity that holds your private key. Next, we'll go into what a private key is but first, let's dive deeper into the three types.‍

Read More

You have questions, we have answers

What can we help you with?