Commonly used terms in the industry



BICSI-certified: A stamp of approval from the professional association that supports the ITS (Information Technology Systems) industry. BICSI serves over 23,000 ITS professionals and offers them education, information and knowledge assessments.


BYOD: The acronym for “Bring Your Own Device,” BYOD refers to employers who allow employees to bring their own mobile devices (such as laptops, smart phones and tablets) to work and allow them to use these devices in conjunction with the company’s private applications and information. Almost half of all businesses in the developed world encourage BYOD among their employees in hopes people will not only be more productive using their own devices and that BYOD will boost company morale.


Convergence: The term used to describe how different technological systems perform similar tasks. Convergence allows data, video and voice technologies to share resources and come together in a seamless and previously unimaginable fashion, which in turn allows businesses and individuals alike to offer unmatched synergy.


Cybercrime – Any criminal activity or a crime that involves the Internet, a computer system, or computer technology in an attempt to defraud or compromise the identity or finances of another. Some examples of cybercrime are identity theft and phishing.


Cyber Threat - The possibility of a malicious attempt to damage or disrupt a computer network or system. An example of this is Malware, computer viruses and computer hacking. A cyber threat is any attempt to defraud or compromise the security of a computer or computer network system.


Cyber Attack – An attempt by hackers to damage or destroy a computer network or computer system. A computer attack can be defined by implementing a computer virus or malware for either malicious intention or for personal gain.

Data: In computing, data is usually identified in a tabular, tree or graph structure. Raw/unprocessed data is a collection of characters and numbers. In the abstract, data is the level at which information and knowledge are obtained.


Data center: The facility that contains all the computer systems, telecommunications systems and storage systems needed by a business. Also houses the backup power supplies, security devices, environmental controls and redundant data communications connections. The biggest data centers use enough electricity to power a small town.


Data center design: The process of figuring out where a data center will be placed and how much space it will occupy. The main elements of data center design include facility topology design (i.e. space planning), technology infrastructure design (i.e. cable plant) and engineering infrastructure design (which entails evaluating electrical systems, such as power, and mechanical systems, including cooling).


Data networking: A connection between a collection of computers that allows for easy exchanging of communication and data. The connection is made with cable and/or wireless media. Modern data networking systems can carry not only data but also voice and video services from leading providers such as Cisco, Avaya and Alcatel-Lucent.


EIA/TIA standards: The TIA (Telecommunications Industry Association) was established in 1988, when it was formed as an offshoot of the Electronics Industries Alliance. These standards address PWT (Personal Wireless Telecommunications) and are based on microcell radio communications systems that offer low-power radio access, over a span of a few hundred meters, between the fixed network and portable equipment.


Hierarchical network: A hierarchical network is an iterative algorithm that establishes networks which can reproduce both scale-free topology and a high clustering of nodes. A hierarchical network can appear in a variety of manners, including in language, social networks and other webpages and biology.


ISO 9001-2008 certification: The part of ISO certification that determines if a management system meets quality standards. There are no limits—in terms of size or type of activity—to the management systems that can qualify for ISO 9001-2008 certification. More than one million companies in more than 170 countries have implemented the standards set by ISO 9001-2008. This is one of several certifications in the ISO 9000 family.


ISO-certified: ISO is the acronym for “International Organization for Standardization.” ISO works with businesses to ensure the services and products they use are of a good, safe and reliable quality. Businesses that use ISO-certified services and products are more productive, as well as more global, than those that do not. Certification is judged and awarded by an independent body, not ISO itself.


IT infrastructure: Another term for “information technology management,” the IT infrastructure is the management of technology resources, including data, software, computer hardware and all the employees who oversee these resources. While IT infrastructure involves plenty of technological aspects—such as network planning, tech support, software design and change management—much of it also includes typical functions of upper management such as budgeting, organizing and controlling and staffing.


LAN: The acronym for “local area network,” which interconnects computers in a small area—such as an office building, school, home or computer lab—and allows these computers to share information and media. LANs are attractive because they can transmit a large amount of data, all without requiring a leased telephone line.


Modular network: Independent networks that are moderated by a neutral intermediary. In a modular network, each of the independent networks works on separate tasks, all of which are intended to accomplish a center goal. The intermediary oversees all of the activity and ensures that none of the individual networks work together during the process.


Network: Connecting a series of computers, located within the same building, that allow users to exchange data and communications. The computers that begin, route and end the data are called nodes.


Network consulting: Involves advising companies on IT infrastructure issues and offering tech support both before and after problems arise. Network consulting is an especially valuable service to smaller companies, most of which do not have full-time IT or tech support people on staff.


Network design: Executed to ensure that both the subscriber and operator are satisfied. Network design involves five facets—business planning, short- and long-term network planning, operations and maintenance and IT asset sourcing—and must be completed before a new telecommunications service or network is established.


Network installation: The implementation of a network within a building. Network installers are trained in industry standards and recognize that all servers are different. In addition, network installers can also add security measures that protect the network (and all its assets) from hackers, user error and viruses.


Network maintenance: Involves overseeing the operations, administration and maintenance of a network. Those involved in operations monitor the networks and try to identify problems before users are impacted. Administration keeps track of the network’s resources while maintenance handles all necessary repairs and upgrades. Network maintenance is often measured by FCAPS: Fault, Configuration, Accounting, Performance and Security.


Network project management: The task of planning a project from start to finish. Essential components of network project management include identifying deadlines, budgets and quality-specific goals and bringing the project to fruition before or at deadline and on or below budget while exceeding the client’s expectations.


NOC (Network Operating Center): Pronounced like “knock,” a network operating center describes the location(s) where network monitoring takes place via satellite, telecommunications or computers. The main responsibilities of network operating centers including network monitoring, troubleshooting and analyzing problems, responding to incidents and reporting about them and communications management.


Remote monitoring: Allows individuals and companies to keep track of LANs and WANs from outside an office setting. Ensures that everything is operating at peak efficiency and immediately identifies any problem areas while recommending potential solutions. Most remote monitoring software allows users to be notified of problems via cell phone or computer. It also collects data so that trends can be analyzed and evaluated.


Structured cabling: Created when five subsystems are brought together: The demarcation point (where the customer’s on-premises wiring connects with the telephone company network), the telecommunications room (which contains the house equipment and wiring consolidation points), the riser cabling (uniting the different telecommunications rooms), plenum cabling (connects all the telecommunications rooms in a building) and work-area components (in which all end-user equipment is connected to the outlets of a horizontal cabling system).


Techsponse: Coranet takes its 24-hour-a-day customer service to a new level with Techsponse. Clients need their telecommunications installation and network installation to operate at peak efficiency every minute of the day. With Techsponse, which comes in both a gold and a platinum package, Coranet can immediately come to the rescue, address the issues and get the network back up and running.


Teleconferencing: A live meeting among people and machines all connected remotely via telecommunications. Teleconferencing encompasses several different means of communications, including phone conferencing, audio conferencing. Teleconferences may also include the exchange of audio data and video services by way of the computer, radio or television.


Telepresence: Encompasses a series of technologies that allow people to feel as if they are present at a meeting, when they’re actually “checking in” from somewhere else. Each user’s voice, actions, position and movements can be sensed and transmitted to the remote location, which allows information to travel between the user and the location where the physical meeting is actually taking place. Telepresence videoconferencing provides users crystal clear sight and sound, both on traditional devices as well as on mobile devices such as phones or Blackberrys.


Unified Communications: The integration of non-real-time communication services with real-time communication services. Just about every type of immediate communication medium—including instant messaging, telephony, video conferencing, call control, speech recognition, presence information and data sharing—can be integrated with unified messaging systems such as voicemail, fax, SMS and email. Unified communications establishes a set user experience and interface within all these different types of media.


Video conferencing: The best and most cost-effective way to get an entire team together at the same time. Video conferencing allows people from across the country and around the world to participate in the same meeting, at a fraction of what it would cost for everyone to travel to a single destination. Video conferencing can take place on a desktop or a laptop and meetings can be coordinated almost instantly.


Voice: Voice technology specializes in speech recognition and converting text to speech to enrich communications for companies that are often of the international and multilingual variety. Voice technology enhances telephone customer service, for both the company and the consumer, by hastening call switching, messaging and other interactive voice services.


VoIP: Voice over Internet Protocol is the method by which multimedia and voice communications are transmitted over the Internet. VoIP is also associated with terms such as broadband phone, broadband telephony, Internet telephony, IP communications, IP telephony and voice over broadband (VoBB).


WAN: The acronym for “wide area network,” which uses private and/or public network transports to interconnect computers in a large regional, metropolitan or national area. WANs are relied upon to transport data along a variety of geographical locations and allow governments and businesses to conduct their daily functions with employees and others who may be located several thousand miles away.


WBENC-certified: WBENC is the acronym for the Women’s Business Enterprise National Council, which was founded in 1997 and is the largest third-party certifier in the United States of business controlled, owned and operated by women. To be certified, businesses must be at least 51% owned and controlled by women who are U.S. citizens and whose daily management and operation is controlled by one or more women owners. WBENC relies on a “Standards and Procedures” manual to determine whether or not a company qualifies for WBENC certification.


Wireless: The transferring of information between multiple points unconnected in an electrical fashion. While wireless technology began with the invention of radio, it now encompasses just about every facet of modern life and allows individuals and businesses to communicate on a 24/7 basis via computers, cellular telephones and other PDAs (personal digital assistants). Wireless is also the bedrock of GPS units as well as other daily staples such as garage door openers, broadcast television and satellite television.