Frequently Asked Questions
Get answers to frequently asked questions about digital marketing, managed IT and everything you need to know about cybersecurity in 2022.
What are some common tech acronyms I may encounter while working with the FOGO team?
Ok, so you might be wondering what in the world we are even talking about when we're describing our services, or you may be struggling to understand what a particular benefit to your company means because you just can't get past the jargon. No worries, we're here to help and explain. The letters we use actually do serve a purpose. (aside from a great way to display our alphabet knowledge!)
Here we've broken down a few of the terms we use often in our work -
A piece of network hardware, which connects your wireless devices to your wired network. The AP, which is connected to a router or switch via an Ethernet cable, is the hub via which your wireless devices connect to your wired LAN (we’ll talk about it too)
A system of tools and resources in an operating system, enabling developers to create software applications.
A technology-enabled discipline in which business and IT work together to ensure the uniformity, accuracy, stewardship, semantic consistency and accountability of the enterprise’s official shared master data assets. Master data is the consistent and uniform set of identifiers and extended attributes that describes the core entities of the enterprise including customers, prospects, citizens, suppliers, sites, hierarchies and chart of accounts.
Allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365). SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider.
An approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network. This model differs from that of traditional networks, which use dedicated hardware devices (i.e., routers and switches) to control network traffic. SDN can create and control a virtual network – or control traditional hardware – via software. While network virtualization allows organizations to segment different virtual networks within a single physical network, or to connect devices on different physical networks to create a single virtual network, software-defined networking enables a new way of controlling the routing of data packets through a centralized server.
Defines the level of service expected by a customer from a supplier, laying out the metrics by which that service is measured, and the remedies or penalties, if any, should the agreed-on service levels not be achieved. Usually, SLAs are between companies and external suppliers, but they may also be between two departments within a company.
The hosting of desktop environments on a central server. It is a form of desktop virtualization, as the specific desktop images run within the virtual machine (VMs) and are delivered to end clients over a network, those endpoints may be PCS or other devices, like tablets or thin client terminals;.
A computer system created using software on one physical computer in order to emulate the functionality of another separate physical computer.
This refers to a service that provides data storage and servers remotely for clients
This is used to represent a secure connection between a network and a user. VPN describes the opportunity to establish a protected network connection when using public networks. VPNs encrypt your internet traffic and disguise your online identity. This makes it more difficult for third parties to track your activities online and steal data.
A group of adjacent binary digits that a computer processes as a unit to form a character such as the letter "C". A byte is a storage unit for data. A byte consists of 8 bits. KB is a kilobyte (1024 bytes); MB is a megabyte (1 million bytes), and GB is a gigabyte (1000 megabytes)
The collection of procedures used to manage workflow in a collaborative environment. In a CMS, data can be defined as nearly anything: documents, movies, pictures, phone numbers, scientific data, and so forth. CMSs are frequently used for storing, controlling, revising, semantically enriching, and publishing documentation. Serving as a central repository, the CMS increases the version level of new updates to an already existing file. Version control is one of the primary advantages of a CMS.
The central processing unit of a computer is like the computer's brain
The traditional spinning drives that stores information
A set of standards for physically connecting and transferring data between computers and peripheral devices. The SCSI standards define commands, protocols, electrical, optical, and logical interfaces.
A standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server.
A wide area network is a telecommunications network that extends over a large geographic area for the primary purpose of computer networking. Wide area networks are often established with leased telecommunication circuits.
Proprietary technology empowered by software and provided as “services”. Unlike the traditional generation of labor-based services, the services of TaaS are highly software-enabled, on-demand, customizable to business contexts, and often virtually-delivered by a system of hardware, software, and people
A computer network that links devices within a building or group of adjacent buildings
Any broadcast domain that is partitioned and isolated in a computer network at the data link layer. LAN is the abbreviation for local area network and in this context, virtual refers to a physical object recreated and altered by additional logic.
A point of presence is an artificial demarcation point or network interface point between communicating entities. A common example is an ISP point of presence, the local access point that allows users to connect to the Internet with their Internet service provider.
A solid-state drive is a solid-state storage device that uses integrated circuit assemblies to store data persistently, typically using flash memory, and functioning as secondary storage in the hierarchy of computer storage
A virtual WAN architecture that allows enterprises to leverage any combination of transport services – including MPLS, LTE, and broadband internet services – to securely connect users to applications
A proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software.
IP is the principal communications protocol in the Internet protocol suite (we already know the FTP, HTTP, and HTTPS from the previous section). It is a set of rules for the routing and addressing of data so that they can travel across networks and reach the correct destination. When traveling across a network such as the Internet, data is divided into small pieces called packets. Attached to each packet is the IP information, which helps the routers send those packets of data to the right address. Each device or domain connected to the internet has a unique IP address and the packets are directed to the correct IP addresses using the IP information.
The second layer of identification needed to log into Miami accounts, usually, a code sent to smartphones or obtained via a fob device.
An electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence
IT professional that oversees database operations, including configuration, database design, capacity planning, and more.
Phone services provided via the internet
The theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
A grouping of flash memory devices that helps boost performance
This controls the computer, telling it what operations to perform. These instructions are on a chip that connects to the motherboard
The main program runs on a computer and begins automatically when the computer is turned on
This displays files in a format that is ready for the web
Also called virtual desktop or hosted desktop services, it is the outsourcing of a virtual desktop infrastructure (VDI) to a third-party service provider
A category of cloud services that provide users with the capability of where the capability provided to the cloud service user is to using network/transport connectivity services and/or inter-cloud network connectivity services
The act of using a visual scanning device to read text from a hard copy and translate it into a format a computer can access (e.g., an ASCII file). OCR systems include an optical scanner for reading text and sophisticated software for analyzing images
An application protocol for distributed, collaborative, hypermedia information systems
An extension of the Hypertext Transfer Protocol. It is used for secure communication over a computer network and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security or, formerly, Secure Sockets Layer.
Also called SSH File Transfer Protocol, this is a network protocol for accessing, transferring, and managing files on remote systems.SFTP allows businesses to securely transfer billing data, funds, and data recovery files. SFTP uses SSH to transfer files and requires that the client be authenticated by the server. Commands and data are encrypted in order to prevent passwords and other sensitive information from being exposed to the network in plain text.
A cyber technology that continually monitors and responds to mitigate cyber threats
P2P is created when two or more PCs are connected and share resources without going through a separate server computer. A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files.
Software designed to detect and destroy computer viruses
A cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.
In computing, Serial Attached SCSI is a point-to-point serial protocol that moves data to and from computer-storage devices such as hard disk drives and tape drives. SAS replaces the older Parallel SCSI bus technology that first appeared in the mid-1980s. SAS, like its predecessor, uses the standard SCSI command set.
A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives. Serial ATA succeeded the earlier Parallel ATA standard to become the predominant interface for storage devices.
Sometimes called Non-Volatile Memory Host Controller Interface Specification, this is an open, logical-device interface specification for accessing a computer's non-volatile storage media usually attached via PCI Express bus.
High availability is a characteristic of a system that aims to ensure an agreed level of operational performance, usually uptime, for a higher than normal period. Modernization has resulted in an increased reliance on these systems.
Get Solutions Today!
Atlanta, GA
800-542-8170
56 Marietta St.
Atlanta, GA 30303
Carrollton, GA
800-542-8170
340 Tom Reeve Drive
Carrollton, GA 30117
Douglasville, GA
678-439-5528
8601 Baldwin Parkway
Suite 201
Douglasville, GA 30134
New Orleans, LA
504-322-3892
935 Gravier Street
10th Floor
New Orleans, LA 70112
Tampa, FL
813-252-1820
1111 N. Westshore Blvd
Suite 300A
Tampa, FL 33607