I sometimes have problems in trying to remember a few of the acronyms in common usage by the IT and Communications industry. I’m building this table to help. I hope you will find use for it in your work as well.
| Acronym | Stands For | Comment |
| ABA | Attacker Behavior Analytics | looking at how cyber criminals are attacking an IT network |
| ACI | Application-Centric Infrastructure | Cisco’s SDN approach launched in 2013 |
| AICPA | American Institute of Certified Public Accountants | US-based authority publishing auditing standards |
| APIC | Application Policy Infrastructure Controller | Cisco’s controller providing policy management as part of its ACI SDN |
| API | Application Programmable Interface | source code based specification intended to be used as an interface by software components to communicate with each other, according to Wikipedia |
| APU | Advanced Processing Unit | microprocessor type |
| ASHRAE | American Society of Heating, Refrigerating and Air-Conditioning Engineers | standards body |
| ASP | Average Selling Price | the division of revenues by nit shipments |
| ASP | Application Service Provider | supplier type |
| AVS | Application Virtual Switch | Cisco switch implementing ACI policies at the virtual networking layer |
| BIPS | Billions of Instructions per Second | microprocessor speed |
| BPaaS | Business Process as a Service | a workload-oriented description of SaaS |
| Brexit | Britain’s exit (from the EU) | a term originating in the UK – now also applied to the election of Donald Trump as US president |
| BRIC | Brazil, Russia, India, China | regional grouping used for targeting ‘growth’ markets |
| BOM | Bill Of Materials | stock keeping item |
| CAD | Computer Aided Design | application and workload description |
| CAMSS | Cloud Analytics Mobile Social Security | IBM’s target markets for the z System |
| CBT | Computer Based Test | standard way of monitoring events |
| CCA | Carbon Change Agreement | UK government plan |
| CCL | Carbon Change Levy | UK government tax |
| CEC | Central Electronics Complex | An IBM term to define a mainframe or high-end storage machine |
| CI | Converged Infrastructure | an integrated system including server, storage, networking and orchestration management software |
| CI/CD | Continuous Integration/Continuous Delivery | software development technique for building, testing and deploying code |
| CICS | Customer Information Control System | IBM mainframe transaction server |
| CIFS | Common Internet File Services | application type |
| CSIRT | Computer Incident Response Team | a group responsible for reacting to security attacks, as in the single point of contact for implementation of the EU’s NIS directive in a member state |
| CO | COntrolling | part of SAP ERP programmes |
| CoD | Capacity on Demand | charging for processors once switched on |
| CPU | Computer Processing Unit | microprocessor type |
| CRAC | Carbon Room Air Conditioning | data centre air handling unit |
| CRC | Carbon Reduction Commitment | UK government plan |
| CRCEES | Carbon Reduction Commitment Energy Reduction Scheme | UK government plan |
| CRM | Customer Relationship Management | A type of software application for interacting with clients and prospects |
| CSP | Cloud Service Provider | typically a supplier of SaaS; could also include IaaS and PaaS vendors |
| CSR | Corporate and Social Responsibility | part of company strategy |
| CXO | Chief X Officer | X’ = anything |
| DACH | Deutschland (Germany), Austria, Confoederatio Helvetica (Switzerland) | the main German speaking nations |
| DAS | Direct Attached Storage | storage devices attached directly into the bus of a server or PC |
| DB2 | Data Base 2 | IBM relational database |
| DB2 Analytics Accelerator | DB2 Analytics Accelerator | IBM PureData for Analytics (Netazza) attachable to System z |
| DDoS | Distributed Denial of Service | a type of security attack |
| DDR | Double Data Rate | for synchronous dynamic random access memory |
| DECC | Department of Environment and Climate Change | UK government department |
| DFSMS | Data Facility Storage Management Subsystem | an automated data management feature of IBM z/OS operating system |
| DIMM | Dual In-line Memory Module | microprocessor component |
| DLP | Data Loss Prevention | software/service to prevent the loss of data |
| DMZ | De-Militarised Zone | data centre protected space |
| DSP | Digital Service Supplier | one target of the EU’s NIS Directive |
| ECC | Error Checking and Correction | microprocessor component |
| EDR | Endpoint Detection and Response | a cloud delivered service providing security for PCs’ smartphones, tablets and virtual desktops |
| EMEA | Europe Middle East and Africa | regional grouping sub regions |
| ERP | Enterprise Resource Planning | workload |
| ETL | Extract, Transform, Load | process of database management used in datawarehousing |
| EU | European Union | regional political grouping |
| FC-NVMe | Non-Volatile Memory express using Fibre Channel | storage architecture |
| FCM | Flash Core Module | a high-end component incorporating solid NAND disks |
| FCoE | Fibre Channel over Ethernet | networking for storage |
| GDPR | General Data Protection Regulation | EU law governing the rights to privacy for EU citizens to be implemented on May 25th 2018 |
| Generation Y | Y = 1980s | the latest generation entering the workforce (born into a technological world, rather than learning it as it develops) |
| GPL | General Public Licence | software licence type |
| GPU | Graphical Processing Unit | microprocessor type |
| GRT | Granular Restore Technology | a feature of Symantec/Veritas backup software |
| HADR | High Availability Disaster Recovery | techniques for ensuring systems against failure and data loss |
| HCI | Hyper-Converged Infrastructure | an integrated system including hardware, hypervisor and virtualisation management software |
| HDMI | High-Definition Multimedia Interface | audio visual connector |
| HTTP | HyperText Transfer Protocol | the foundation of communications via the World Wide Web |
| HUGI | Hurry Up (and) Get Idle | microprocessor term |
| IAM | Identity Access Management | software for protecting IT applications and resources from unauthorised users |
| ICS | Industrial Control System | computer systems used to monitor and control industrial processes |
| ICT | Information and Communications Technology | a name for the whole computing and telecommunications market |
| I/O | Input/Output | hardware type |
| IaaS | Infrastructure as a Service | Cloud Computing workload |
| IAM | Identity Access Management | a way of preventing security attacks |
| IDS | Intruder Detection System | a method for discovering cybersecurity attacks |
| IFL | Integrated Facility for Linux | IBM mainframe term for offloading Linux workloads |
| iLO | integrated Lights Out | an internal HP server management system |
| IOT | Integrated Operating Team | IBM operational territories such as North America |
| ITOM | Information Technology Operations Management | IBM term for software management and analytics offerings |
| ISMS | Information Security Management System | term for the process of securing corporate IT systems |
| JBOD | Just a Bunch Of Disks | Raw storage connected in an array without RAID configuration |
| JBOM | Just a Bunch Of Memory | Raw memory (DRAM or NAND) connected in an array without RAIM configuration |
| IP | Internet Protocol | the communications protocol that routes traffic across the Internet |
| IP | Intellectual Property | relating to the owner of patents for technology or methods |
| IP | Instruction Processor | the building block of System z machines |
| IPS | Intrusion Protection System | a method for spotting security attacks |
| IPV6 | Internet Protocol version 6 | uses a 128-bit address, allowing 7.9×1028times as many as IPv4, which uses 32-bit addresses |
| ISAM | IBM Indexed Sequential Access Method | a way of indexing data for fast retrieval, originally developed for mainframe computing |
| ISV | Independent Software Vendor | supplier type |
| ITC | Information Technology and Communications | a name for the whole computing and telecommunications market |
| ITIL | Information Technology Infrastructure Library | certifiable and formal IT processes |
| JBOD | Just a Bunch Of Disks | simple storage implementation without RAID |
| JBOF | Just a Bunch Of Fals disks | simple flash storage implementation without RAID |
| JCL | Job Control Language | scripting language for IBM mainframe operating systems |
| KVM | Kernel-based Virtual Machine | in this case not Keyboard Video Monitor |
| L2 | Level Two | used for cache memory |
| LAN | Local Area Network | hardware type |
| LUN | Logical Unit Number | unique identifier of SCSI drives (0 to 7) |
| LoB | Line of Business | a description of organisational users/buyers outside the IT shop |
| M&O | Management and Orchestration | a description of system and virtualisation software used by VCE |
| MCA | Micro Chip Architecture | not in this case Micro Channel Achitecture, which was a feature of IBM’s PS/2 |
| MDR | Managed Detection and Response | security service identifying threats and dealing with them proactively |
| MEDR | Managed Endpoint Detection and Response | security service identifying threats to PCs, smartphones, tablets and virtual desktops and dealing with them proactively |
| MIPS | Millions of Instructions per Second | microprocessor sped |
| MemCache | Memory Caching | used to speed up dynamic database-driven websites by caching data and objects in RAM |
| MPLS | Multi-Protocol Label Switching | networking type |
| MQ | Message Queue | IBM message orientated middleware |
| MSP | Managed Service Provider | cloud delivering IT services supplier |
| MSSP | Managed Security Service Provider | cloud delivering security supplier |
| NAND | Negated And | a logic gate which produces an output that is false only if all its inputs are true used in solid state memory devices |
| NGFW | Next Generation FireWall | a newer type of firewall |
| NAS | Network Attached Storage | storage system type |
| NIC | Network Interface Card | component added to a computing device to enable connectivity to an IT network |
| NIS Directive | Network and Information Security Directive | EU legislation enacted by member states in 2018 setting out the legal obligations on providers to protect critical services by improving cyber-security. |
| NTA | Network Traffic Analysis | cloud delivered service analysing and reporting on an organisation’s network data flows |
| NFS | Network File System | networking type |
| NFV | Network Functions Virtualization | the decoupling of network functions from dedicated hardware devices – part of SDN |
| NGD | Next Generation Data | Company name |
| NIC | Network Interface Controller | a device connecting a computer or storage device to a network |
| NOR | Not Or | a digital logic gate that implements logical NOR used in solid state memory devices |
| NoSQL | Not only SQL | a database type that goes beyond SQL’s column and row approach, often used for Big Data using a single data structure such as key–value pairs, wide columns, graphs, or documents—to hold information |
| NSK | Non Stop Kernel | HP (originally Tandem) operating system |
| NSX | unknown acronym | VMware’s SDN |
| NVMe | Non-Volatile Memory express | a way of building flash-based storage systems using PCIe without emulating SAS or SATA disk drives |
| NVMeoF | Non-Volatile Memory express over Fabric | a way of building flash-based storage systems without emulating SAS or SATA disk drives |
| NVMe oI | NVMe over Infiniband | SAN connected via Mellanox made Infiniband |
| NVMeoFC | NVMe over Fibre Channel | NVMe drives connected via a Fibre Channel SAN |
| NYSE | New York Stock Exchange | organisation name |
| ODCA | Open Data Center Alliance | user group |
| ODM | Original Design Manufacturer | supplier role purchasing components to make its own systems – often to provide cloud services |
| OEM | Original Equipment Manufacturer | supplier role in taking another’s product and rebranding it as its own |
| OES | Open Enterprise Server | Novell LAN operating system |
| OES | Operator of Essential Services | one target of the EU’s NIS Directive |
| OMAP | Open Multimedia Application Platform | software standard |
| OpenCL | Open Computing Language | software development standard |
| OpenGL | Open Graphics Library | software development standard for graphics |
| OSS | Operations Support Systems | computers used by Telcoms suppliers to manage their networks |
| OT | Operational Technology | computers used for industrial – as opposed to administrative – purposes |
| OTT | Over The Top | used to describe application delivery which avoids traditional delievery and sales channels |
| PaaS | Platform as a Service | Cloud Computing workload |
| PACS | Picture Archiving and Communication System | storage systems standard |
| PC AT | Personal Computer advanced Technology | the first PC to be shipped with an integrated hard disk |
| PCIe | Peripheral Component Interconnect express | standard connector built into servers and storage area arrays for adding FCMs |
| Physical Access | an attack involving the theft of physical equipment from an organisation or individual | |
| PIGS | Portugal, Ireland, Greece and Spain | sometimes ‘Italy’ – not ‘Ireland’ |
| PIIGS | Portugal, Ireland, Italy, Greece and Spain | includes Italy and Ireland |
| PKI | Public Key Infrastructure | an IT system protected through the use of encryption |
| PLM | Product Lifecycle Management | software driven process of managing the design and manufacturing of products |
| PoP | Point of Presence | the location of resources (data centres, offices, etc.) |
| prosumer | pro(ducer con)sumer | consumers adding content to the Internet |
| PDU | Power Distribution Unit | physical connection to electricity, typically in the data centre |
| PUE | Power Usage Efficiency | a rating of the electrical efficiency, typically in the data centre |
| QoS | Quality of Service | a guaranteed level of performance based on an SLA |
| RAID | Redundant Array of Inexpensive Disks | various combinations of raw storage connected to provide protection from physical breakages and data loss |
| RAIM | Redundant Array of Independent Memory | various combinations of memory (DRAM or NAND) connected to provide protection from physical breakages and data loss |
| RBAC | Role-Based Access Control | the restriction of system access to authorised users |
| RDMA | Remote Direct Memory Access | communications protocol |
| RHEL | Red Hat Enterprise Linux | product name |
| RHEV | Red Hat Enterprise Virtualization | product name |
| RIM | Research In Motion | Company name |
| RISC | Reduced Instruction Set Computing | chip architectures used in IBM Power and Oracle/Sun Solaris Unix servers |
| RoCE | RDMA over Converged Ethernet | network protocol |
| RoHS | Reduction of Hazardous Substances | EC legislation restricting the use of noxious materials in electrical equipment |
| RPO | Recovery Point Objective | The planned amount of data to be recovered in a storage failure |
| RTO | Recovery Time Objective | The planned period of time to recover from a storage failure |
| SaaS | Software as a Service | Cloud Computing workload |
| SAN | Storage Area Network | storage system type |
| SAM | Serviceable Available Market | the part of the ‘TAM’ for which a supplier has relevant offerings |
| SAS | Serial-attached SCSI (Small Computer System Interface) | a low cost disk drive and an acronym of acronyms |
| SATA | Serial Advanced Technology Adopter | a computer bus interface connecting host bus adaoptors to storage devices |
| SCADA | Supervisory Control and Data Acquisition | computer systems which display the process under control and provide access to control functions |
| SCSI | Small Computer Standard Interface | a point-to-point connection protocol connecting disk drives to computers |
| SDDC | Software Defined Data Centre | an application-down approach to infrastructure including orchestration |
| SDN | Software Defined Network | an application-down approach to networking |
| SDS | Software Defined Storage | an application-down approach to storage, separating control and data planes |
| SIEM | Security Information and Event Management | a type of security software |
| SLA | Service Level Agreement | A formal contract to supply a set standard of computing experience – often over a specific time span |
| SKU | Stock Keeping Units | number of different configurations for sale |
| SMAC | Social Mobile Analytics Cloud | a description of modern application drivers |
| SMB | Server Message Block | a network sharing file protocol common of Microsoft Windows environments |
| SMB | Small and Medium Business | a description of user organisations by employee size – typically between 0 and 1,000 employees |
| SMP | Symmetrical Multi-Processing | processor design type |
| SME | Small and Medium Enterprises | a description of user organisations by employee size – typically between 0 and 1,000 employees |
| SoC | System on Chip | microprocessor design incorporating multiple components |
| SOC | Security Operations Center | physical offices for the detection of security attacks |
| SOC2 | System and Organization Control 2 | an SSAE financial auditing regulation including cyber security issues |
| Spear Phishing | an attack on specific organisations and individuals with rogue email messages to acquire information such as usernames, passwords and credit card details | |
| SPEC | The Standard Performance Evaluation Corporation | benchmarking body |
| SQL | Strucured Query Language | A standard system using columns and rows commonly used for all relational databases |
| SQL Injection | an attack on data driven applications by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database | |
| SSAE | Statement on Standards for Attestation Engagements | auditing information of the AICPA |
| SSL VPN | Secure Sockets Layer Virtual Private Network | a method of providing use security protection by hiding IP addresses |
| SSO | Single Sign On | software which allows users of multiple applications to be authenticated once for all of them |
| STEM | Science Technology Engineering Maths | school curriculum focus on industry subjects |
| SVC | Storage Virtual Controller | IBM storage system offering |
| TAM | Total Available Market | marketing term for all spending associated with a market or sub-market |
| TB | Terabyte | storage capacity |
| TCA | Total Cost of Acquisition | used in comparing costs of old v new solutions |
| TCO | Total Cost of Ownership | used in comparing costs of old v new solutions |
| TEM | Trusted Enterprise Manager | |
| TPC | Tivoli Storage Productivity Center | IBM storage systems management offering |
| TLS/SSL | Transport Layer Security/Secure Sockets Layer | encryption techniques used by telcos and cloud suppliers for data in motion |
| Trojan Software | an attack involving a non self-replicating Malware programme appearing to perform a desirable function, but providing backdoor entry for unauthorised access to the target computer | |
| TSM | Tivoli Storage Manager | IBM storage systems management offering |
| UBA | User Behaviour Analytics | security process evaluating how users interact with an organisation’s IT |
| UCS | Unified Computing System | Cisco IT including servers |
| UPS | Uninterruptible Power Supply | redundant power provisioning unit |
| UTM | Unified Threat Management | software/service providing security from criminal intrusion into IT systems |
| VAAI | vStorage API for Array Integration | a VMware storage API |
| VADP | vStorage API for Data Protection | a VMware storage API for data protection |
| VASA | vStorage API for Storage Awareness | a VMware storage API |
| VCE | Virtual Computing Environment | company name (incorporating EMC, Cisco and VMware elements) |
| VDI | Virtual Desktop Infrastructure | PC virtualisation type |
| VM | Virtual Machine | a guest operating system running on top of a server hypervisor |
| VSAN | Virtual Storage Area Network | a collection of ports from connected Fibre Channel switches forming a virtual fabric offering high-level protocols such as FCP, FCIP, FICON or iSCSI |
| Web 2.0 | 2.0 = newer | newer Internet companies |
| VVOL | VMware Virtual Volumes | a VMWare API |
| WAF | Web Application Firewall | a way of restricting the flow of data from HTTP applications |
| x86 | x86 | chip architectures using the x86 instruction set currently produced by Intel and AMD |
| XIV | Latin for 14 | an Israel-based storage systems company acquired by IBM in 2008 |
| zAAP | z Application Assist Processor | IBM mainframe term for offloading Java workloads |
| zBX | z BladeCenter eXtension | IBM mainframe term for its attached processor cabinet |
| zIIP | z Integrated Information Processor | IBM mainframe term for offloading database workloads |
| XGS | IBM Security Network Protection product range | |
| XSS | Cross-Site Scripting | a type of security attack |






