IT Explained

We at Paessler use IT-related terms constantly and we are very much aware of the “The Imposter Syndrome” in IT 
when professionals continue using terminology they might not even understand themselves.

“IT explained” therefore isn’t a book review on Stephen King’s great novel, but the summary and explanation of tricky,
sometimes misinterpreted terms of information technology.

You feel there’s something missing? Get in touch with us!




IIoT stands for the Industrial Internet of Things and refers to a network of connected devices in the industrial sector. It is a subset of the Internet of Things (IoT) ➤ Find out more about IIoT, IoT, and OT here!

Read more


TLS is short for Transport Layer Security. It is a form of security protocol that offers high levels of privacy, as well as data integrity when it comes to communication using networks and the internet.

Read more


CCTV stands for closed-circuit television and is commonly known as video surveillance.CCTV networks are commonly used to detect and deter criminal activities, and record traffic infractions, but they have other uses.

Read more

Packet Sniffing

Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network.

Read more


MQTT stands for Message Queuing Telemetry Transport. It is a lightweight messaging protocol for use in cases where clients need a small code footprint and are connected to unreliable networks or networks with limited bandwidth resources.

Read more


Retrofitting is updating or adding equipment, sensors, or services to existing hardware so that it is able to make use of new technologies.

Read more


VPN stands for Virtual Private Network. It is a method by which two end-points create a single, private connection, or tunnel, while using a larger network infrastructure such as the internet or WAN.

Read more


REST is an architecture style definition applied to networked applications. It exists as a series of constraints applied to the implementation of network components, enabling uniform interface semantics, rather than application-specific implementations and syntax.

Read more


LPWA stands for Low-Power Wide-Area and serves as a generic term for any network designed to communicate wirelessly with lower power than other networks such as cellular, satellite, or WiFi.

Read more


WMI stands for Windows Management Instrumentation. Designed by Microsoft, it is an infrastructure for the standardized management of data and information that is device independent.

Read more


A server is a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network. In theory, whenever computers share resources with client machines they are considered servers.

Read more


SNMP stands for Simple Network Monitoring Protocol. It is a protocol for management information transfer in networks, for use in LANs especially.

Read more

Active Directory

Active Directory (AD) is a directory service created by Microsoft for use in a Windows Server environment.

Read more


Bandwidth is the amount of data that can be transferred from one point to another within a network in a specific amount of time. It is measured in bits per second.

Read more


Virtualization is the process of creating a virtual version of something like computer hardware. It allows to create multiple environments from a single system

Read more

IP address

An IP address (internet protocol address) is a numerical representation that uniquely identifies a specific interface on the network.

Read more


Ping is a command-line utility to test the reachability of a networked device. It sends a echo request and expects an echo reply from the target host.

Read more


Syslog is a protocol used to send system log or event messages to a specific server. It is primarily used to collect device logs in a central location...

Read more


NetFlow is a network monitoring protocol that allows a NetFlow enabled device to collect, aggregate, and export all passing traffic data...

Read more

This third party content uses Performance cookies. Change your Cookie Settings or

load anyways

*This will leave your Cookie Settings unchanged.