IT Consulting

More IT terms explained

We realize that last week’s blog post about the IT terms every business should know was a bit lacking as it mostly approached only the very basic terms. We like to keep our blogs toward the shorter side as to not let our geekiness bore our more mainstream readers and clients. But, staying with the same effort of keeping our client’s well-versed in tech jargon, we look to use this space to further explain some of the terms an IT consultant may throw at you. These common terms are just some of those that we’ve seen leave some clients with that unmistakable deer-in-the-headlights look:

NAT – When a single IP address is shared among many devices, it requires a Network Address Translation, used by the router, to do so. For example, a NAT will be required if your business uses a variety of laptops, desktops and tablets that all connect by using the same IP address. Your ISP provides you with your IP address.

DHCP – When you need to connect a laptop to your Wi-Fi network, it’s the Dynamic Host Configuration Protocol that allows you to avoid having to set up a static IP address manually. Through this protocol, your device automatically requests the router for an IP adress. Network settings are also assigned through the DHCP.

Hostnames- For each device connected to a network, a hostname is given to identify it. A hostname is simply a label that can be read by humans.

Domain Name – A domain name is basically the base part of your company’s website address, like A domain name is just another type of hostname.

Ethernet – If your company’s computers use a cable to connect to the internet, you are using the standard wired network technology that is referred to as ethernet. It requires the use of an ethernet cable plugged into the ethernet port on your computer.

Once again, we’ve run out of space to explain more network and computer terms, but as Chesterfield’s Top-Rated Local® IT consultants and cloud service provider we work to be as transparent as possible; welcoming whatever questions our existing and potential customers have. Look for future posts that further explain those terms you’ve always questioned.


Proactive and Layered Protection for Today’s Advanced Security Threats

The old saying, “An ounce of prevention is worth a pound of cure.” certainly applies to today’s world of advanced IT security threats.  There is no longer any doubt that a proactive, layered approach to protecting IT assets is the emerging standard.

When it comes to anti-virus protection the layered approach continues. Anti-virus tools are layering into three distinct categories: traditional A-V, endpoint protection and incident response. Managed together, each component can fill the “gaps” that can exist for many business networks.

Security solutions available to manufacturers include Bit9/Carbon Black, Webroot and Crowdstrike. FracRack likes Bit9/Carbon Black: combined they can provide an effective tool.