If you’re just starting out in the industry, or a seasoned IT professional, new jargon has a way of coming about, leaving you in the dark. As technology advances, this problem will continue as new ideas are created, along with new words to describe them. But don’t worry, we keep up with the latest and greatest terminology so that we can keep you informed. Below are some of the most common terms and acronyms used in IT today that you may not be familiar with or have a full understanding of.
BCD: BCD is short for body camera data. It is the audio and video data that is being recorded by body cameras. BCD can be a problem for agencies that require body cameras as they accumulate a large amount of surveillance footage (some departments are required to keep footage for at least 90 days), leading many law enforcement organizations questioning how to store that data. More and more these agencies are turning to industry-compliant cloud solutions so that as their data grows, the storage can grow along with it.
BWC: BWC is the acronym for body-worn cameras. The reason this is being spoken of so frequently in the IT world is because of the amount of data that these cameras are capturing and storing.
Breach: In the tech industry, a data breach is the release of secure or confidential information. This release can be done intentionally or unintentionally. When done intentionally, it is usually so that the person can steal information that will cause harm/do damage, or they will use it for financial gain. But unfortunately, even when it is done unintentionally, it can still cripple an organization with the release of private information.
CJIS: The Criminal Justice Information Services (CJIS) was established in 1992 and is a division of the FBI. It is a high-tech intelligence hub linking almost 20,000 law enforcement agencies across the country to a massive database of crime reports, fingerprints, and other agency data. CJIS gives law enforcement, national security, and intelligence community partners the information they need to protect the United States, while preserving civil liberties. Being CJIS compliant, which means abiding by their strict regulations, is a necessity when implementing law enforcement software.
Colo: Colocation (Colo) is a model of cloud computing in which a value-added reseller (VAR) rents out space for an organization's servers and other hardware. The customer maintains ownership of their equipment, and the provider is typically responsible for the cooling, power, bandwidth, housing, and physical security of the equipment.
Compliance: In IT, this refers to the strict regulations, that by law, some industries must follow in order to protect their data. Some key compliance certifications include SOC 1 and SOC 2, concerning financial statements; HIPAA and HITECH for healthcare organizations; CJIS for government and law enforcement agencies; and PCI for companies performing financial transactions.
DPaaS: Data protection as a service (DPaaS) is something offered by cloud providers to help organizations secure their data. DPaaS helps with archival data for long-term retention requirements, and aids in the quick recovery of any current data to avoid business interruption.
DRaaS: Disaster recovery as a service (DRaaS) is a cloud computing model used for protecting data or applications from disaster; whether in the form of a cyberattack, power outage, human error, or Mother Nature. DRaaS enables an organization to house its data within a service provider’s cloud backup, without having to maintain their own storage infrastructure. It also plays a key role in business continuity, allowing organizations to quickly recover critical business applications in the aftermath of a disaster.
HIPAA: HIPAA stands for the Health Insurance Portability and Accountability Act. It is a US law designed to provide privacy standards to protect patients' medical records, and other health-related information used by healthcare providers, doctors, hospitals, and other authorized organizations.
IaaS: Infrastructure as a service (IaaS) refers to offloading infrastructure components generally present in an on-premises data center; including servers, storage, and networking hardware to a cloud provider. The IaaS provider may also offer monitoring, security, load balancing, and clustering, as well as storage resiliency like backup and recovery.
Migration: No, not what birds do in the winter. The term migration, when used in technology is typically referring to the transfer of data from one computer storage system to another. Common reasons for migrating data include: moving to the cloud, upgrading servers, replacing storage equipment, and software upgrades.
VAR: A Value-Added Reseller (VAR), is typically an IT software provider that complements their specialized service with additional functionality through a cloud provider. For example, a company offering design software may include a cloud provider’s storage service to enhance their product’s value.
Hopefully this list helps you feel more comfortable when speaking to someone that uses acronyms, or less common terms. As always, if you have any questions about any of the terms above, or how the staff at DSM can be your on-hand IT experts, reach out. As Florida’s predictable cloud provider, we’re here to ensure that you can focus on your business, without worrying about the technology that runs it.