AIX backup format
BFF stands for AIX backup format
Fog computing is a distributed computing infrastructure in which some application services are handled at the network edge while others are handled ...
Amazon EC2 Dedicated Hosts are servers with virtual machine capacity dedicated to one Amazon Web Services customer, instead of sharing server capacity with other customers.
AWS Lambda is an event-driven computing cloud service from Amazon Web Services that allows developers to provision resources for a programming function on a pay-per-use basis without having to be concerned about what Amazon storage or compute resources will support it.
AWS GovCloud is an isolated data center region of the Amazon Web Services (AWS) cloud designed to meet strict compliance requirements as defined by the U.S. Government.
A chief procurement officer (CPO) is an executive title commonly given to the person responsible for the strategic acquisition of goods and services at an organization. In addition to establishing the policies and processes to guide acquisitions, duties of a CPO include reducing costs and ensuring excellent supplier performance.
Innovation process management (IPM) a systematic approach to nurturing the creative capabilities of employees and creating a workplace environment that encourages new ideas for workflows, methodologies, services or products.
Paternalistic leadership is a managerial approach that involves a dominant authority figure who acts as a patriarch or matriarch and treats employees and partners as though they members of a large, extended family. Employees are listened to, but the leader makes the final decision.
A Trojan horse is a program that appears harmless but is, in fact, malicious. Attackers have long used Trojan horses as a way to trick end users into installing malware.
A honeypot is a computer system that is set up to act as a decoy to lure cyberattacks and to detect, deflect, or study attempts to gain unauthorized access to information systems.
Secure Shell (SSH) is a network protocol that secures data communications between computers on an insecure network using strong authentication and encryption. SSH also refers to the utility suite that implements the protocol, and which can be used to enable terminal sessions, file transfers and remote command execution.
Machine-generated data (MGD) is information that is produced by mechanical or digital devices. The term is often used to describe the data that is generated by an organization’s industrial control systems and mechanical devices that are designed to carry out a single function.
An IoT device is any nonstandard computing device that connects wirelessly to a network and has the ability to transmit data; these are the things in the Internet of Things.
MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol that provides sensors and other resource-constrained network clients with a simple way to distribute telemetry information. The protocol, which employs a publish/subscribe communication pattern and is managed by OASIS, is used for machine-to-machine (M2M) communication in the Internet of Things (IoT).
Leaf-spine is a two-layer network topology composed of leaf switches (to which servers and storage connect) and spine switches (to which leaf switches connect). Leaf switches mesh into the spine, forming the access layer that delivers network connection points for servers.
A data center administrator monitors systems, installs equipment and cabling, and participates in change processes and everyday procedures that support information technology.
Load shedding is a reduction of power demand by a utility provider during peak or stressed times. Participants voluntarily reduce demand for utility power and rely on secondary sources for uninterrupted operation, or lower or lose power supply in an involuntary load shedding event.
The Business Continuity Institute, which was started in 1994 and is headquartered out of the United Kingdom, is an international organization that offers accreditation and certification, networking, published resources, training and guidance for business continuity professionals.
The Federal Financial Institutions Examination Council developed the Cybersecurity Assessment Tool to help organizations identify cybersecurity risks and determine their level of preparedness.
An emergency communications plan (EC plan) provides guidelines, contact information and procedures for how information should be shared should a crisis that requires immediate action occur.
The Salesforce Customer Success Platform is the official name of the Salesforce portfolio of products.
Aura is a user interface framework for developing dynamic Web apps for mobile and desktop devices.
The Salesforce Service Console is the centralized interface in the Salesforce Service Cloud with which agents can view all relevant customer information related to a case, as well as their call queue and more.
Cost of goods sold (COGS) is the total of the costs directly attributable to producing goods. It includes material and labor costs but not indirect costs such as sales, marketing and distribution. In accounting, it is a standard item in the expense section of a company's income statement.
Reference checking software is programming that automates the process of contacting and questioning the references of job applicants.The entire process occurs on the Internet and may be used independently or integrated with an applicant tracking system.
Zuora sells software that helps companies manage their cloud subscriptions, including sales, pricing, billing, collection and renewal. Zuora also offers analytics software that tracks information on subscribers and offers ways to boost services or react to problems.