Desculpe, esta página ainda não está disponível em português.

IT Explained

We at Paessler use IT-related terms constantly and we are very much aware of the “The Imposter Syndrome” in IT 
when professionals continue using terminology they might not even understand themselves.

“IT explained” therefore isn’t a book review on Stephen King’s great novel, but the summary and explanation of tricky,
sometimes misinterpreted terms of information technology.

You feel there’s something missing? Get in touch with us!



Question about terminology? Find your answer here!

Unified Communications (UC)

UC stands for unified communications. It describes a framework or standard that incorporates various components such as software, hardware, and services to enhance business communication.

Read more


Digital Imaging and Communications in Medicine (DICOM) is an international, nonproprietary standard that specifies the protocols used to facilitate the exchange of medical images.

Read more


The goal of HL7 is to enhance interoperability between healthcare information systems (HISs) that have implemented it.

Read more


OPC UA stands for OPC Unified Architecture. It is an extensible, platform-independent standard that enables the secure exchange of information in industrial systems.

Read more


HCI stands for hyperconverged infrastructure. HCI is made up of virtual networking, administration, and storage and computing components that share resources.

Read more


IIoT stands for the Industrial Internet of Things and refers to a network of connected devices in the industrial sector. It is a subset of the Internet of Things (IoT) .

Read more


TLS stands for Transport Layer Security. It is a cryptographic protocol used to secure data sent over a network, like internet traffic. TLS secures the transmission and delivery of data.

Read more


CCTV stands for closed-circuit television and is commonly known as video surveillance.CCTV networks are commonly used to detect and deter criminal activities, and record traffic infractions, but they have other uses.

Read more

Packet Sniffing

Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network.

Read more


MQTT stands for Message Queuing Telemetry Transport. It is a lightweight messaging protocol for use in cases where clients need a small code footprint and are connected to unreliable networks or networks with limited bandwidth resources.

Read more


Retrofitting is updating or adding equipment, sensors, or services to existing hardware so that it is able to make use of new technologies.

Read more


VPN stands for Virtual Private Network. It is a method by which two end-points create a single, private connection, or tunnel, while using a larger network infrastructure such as the internet or WAN.

Read more


REST is an architecture style definition applied to networked applications. It exists as a series of constraints applied to the implementation of network components, enabling uniform interface semantics, rather than application-specific implementations and syntax.

Read more


LPWA stands for Low-Power Wide-Area and serves as a generic term for any network designed to communicate wirelessly with lower power than other networks such as cellular, satellite, or WiFi.

Read more


WMI stands for Windows Management Instrumentation. Designed by Microsoft, it is an infrastructure for the standardized management of data and information that is device independent.

Read more


A server is a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network. In theory, whenever computers share resources with client machines they are considered servers.

Read more


SNMP stands for Simple Network Monitoring Protocol. It is a protocol for management information transfer in networks, for use in LANs especially.

Read more

Active Directory

Active Directory (AD) is a directory service created by Microsoft for use in a Windows Server environment.

Read more


Bandwidth is the amount of data that can be transferred from one point to another within a network in a specific amount of time. It is measured in bits per second.

Read more


Virtualization is the process of creating a virtual version of something like computer hardware. It allows to create multiple environments from a single system

Read more

IP address

An IP address (internet protocol address) is a numerical representation that uniquely identifies a specific interface on the network.

Read more


Ping is a command-line utility to test the reachability of a networked device. It sends a echo request and expects an echo reply from the target host.

Read more


Syslog is a protocol used to send system log or event messages to a specific server. It is primarily used to collect device logs in a central location...

Read more


NetFlow is a network monitoring protocol that allows a NetFlow enabled device to collect, aggregate, and export all passing traffic data...

Read more

This third party content uses Performance cookies. Change your Cookie Settings or

load anyways

*This will leave your Cookie Settings unchanged.