Andrea Masella

La rivoluzione digitale

La tecnologia ha rivoluzionato drasticamente le abitudini lavorative di ognuno di noi, effetti delle novità informatiche che comunque si fanno sentire sotto varie forme e in ogni settore. I classici sistemi e le tradizionali abitudini del passato sono velocemente andati in pensione, per lasciare campo libero a sistemi digitali di ultimo grido e di alta qualità. Comportamenti umani costretti a cambiare da una serie di risvolti tecnologici, nuove risorse che ai giorni nostri caratterizzano fortemente il mercato del lavoro. Negli ultimi decenni abbiamo assistito a una vera e propria rivoluzione digitale che non poteva che coinvolgere anche i processi aziendali, velocizzati e ottimizzati da eccellenti sistemi tecnologici. Oggi l’utilizzo dei sistemi informatici è massiccio e destinato a crescere con il passare degli anni. Una facile previsione dovuta alla grande funzionalità delle infrastrutture digitali, compagne di lavoro ideali per enti, aziende e liberi professionisti. La rivoluzione digitale ha prodotto in tempi relativamente brevi una lunga serie di novità tecnologiche e nuovi vocaboli diventati chi più, chi meno, di uso comune. A dispetto dell’uso frequente di sistemi e termini informatici, non tutti gli utenti però conoscono alla perfezione alcune dinamiche e il significato di alcuni vocaboli. Invece approfondire determinate tematiche in un mondo digitale come il nostro sarebbe davvero una buona regola, un modo per non rimanere spiazzati di fronte a certe circostanze e per restare al passo con i tempi. Passiamo quindi di seguito a elencare, sia pure in maniera non esaustiva, questa marea di termini informatici che hanno arricchito il vocabolario italiano.

Termini informatici

Access Control List (ACL)
Access Point
Account
Active Directory (AD)
Active Directory Administrative Center (ADAC)
Active Directory Domain Services (AD DS)
Active Directory Lightweight Directory Services (AD LDS)
Active Directory Rights Management Services (AD RMS)
Active Directory Service Interfaces (ADSI)
Active Queue Management (AQM)
Active Server Pages (ASP)
Address Resolution Protocol (ARP)
Advanced Encryption Standard (AES)
Advanced Technology Attachment (ATA)
Adware
Algorithmic Oriented Language (ALGOL)
Algoritmo
American National Standards Institute (ANSI)
American Standard Code for Information Interchange (ASCII)
Amministratore di Sistema
Antivirus
Application Programming Interface (API)
Application Service Provider (ASP)
Arithmetic Logic Unit (ALU)
Artificial Intelligence (AI)
Assembler
Asymmetric Digital Subscriber Line (ADSL)
Asynchronous Transfer Mode (ATM)
Augmented Reality (AR)
Automatic Virtual Hard Drive v2 (AVHDX)
Automatic Virtual Machine Activation (AVMA)
Avatar
Backdoor
Background
Backslash
Backup
Banca dati
Banner
Base di dati
Basic Input-Output System (BIOS)
Batch
Best Practices Analyzer (BPA)
Big data
Binary digit (Bit)
Bit di parità
Blank
Blind carbon copy (Bcc)
Blockchain
Bluetooth
Blu-ray Disc (BD)
Boot
Botnet
Bridge
Browser
Browser Hijacking
Brute Force
Buffer
Bug
Bus
Business Activity Monitoring (BAM)
Business Continuity
Business Intelligence (BI)
Business Process Reengineering (BPR)
Business to Business (B2B)
Business to Consumer (B2C)
Byte
Cache
Caching
Campo
Campus Area Network (CAN)
Caratteri speciali
Carbon copy (Cc)
Cascading Style Sheets (CSS)
Case sensitivity
Cavi di dorsale
Center for Internet Security (CIS)
Central Processing Unit (CPU)
Centro Elaborazione Dati (CED)
Chat
Checksum
Chip
Chipset
Chkdsk
Cibernetica
Classless Inter-Domain Routing (CIDR)
Click
Client
Clock
Clone
Cloud Computing
Cluster
Cluster Shared Volume (CSV)
Cluster-Aware Updating (CAU)
Comma Separated Values (CSV)
Command Line Interface (CLI)
Common Name (CN)
Compact Disk (CD)
Compact Flash (CF)
Component Object Model (COM)
Computer
Computer Aided Drawing (CAD)
Concatenamento
Conference call
Connessione
Console
Container as a Service (CaaS)
Content Delivery Network (CDN)
Cookie
Core
Cracking
Crash
Crittografia
Cross-Site Scripting (XSS)
Cursore
Customer Relationship Management (CRM)
Customizzazione
Cyberbullying
Cybercrime
Cybersecurity
Data Control Language (DCL)
Data deduplication
Data Definition Language (DDL)
Data entry
Data Execution Prevention (DEP)
Data Manipulation Language (DML)
Data Query Language (DQL)
Data Terminal Equipment (DTE)
Data Transaction Language (DTL)
Database (DB)
Database Administrator (DBA)
Database as a Service (DBaaS)
Database Management System (DBMS)
Datacenter
Dato
Debugger
Default
Defrag
Demo
Deployment
Deployment Image Servicing and Management (DISM)
Desktop
Desktop as a Service (DaaS)
Device Media Control Language (DMCL)
Digital Subscriber Line (DSL)
Digital Versatile Disc (DVD)
Digitale
Digitalizzazione
Directory
Directory Information Tree (DIT)
Directory Services Restore Mode (DSRM)
Disaster Recovery
Disk Operating System (DOS)
Display
DisplayPort (DP)
Dispositivo
Distinguished Name (DN)
Distributed Denial of Service (DDoS)
Distributed File System (DFS)
Distributed Reflection Denial of Service (DRDoS)
Distribuzioni
Document Object Model (DOM)
Domain Component (DC)
Domain Controller (DC)
Domain Local Group (DLG)
Domain Name System (DNS)
Dominio
Download
Downstream
Drag and Drop
Driver
Dual In-Line Memory Module (DIMM)
Dynamic Access Control (DAC)
Dynamic Host Configuration Protocol (DHCP)
Dynamic Link Library (DLL)
Email
Emoticon
End User License Agreement (EULA)
Enterprise Resource Planning (ERP)
Eseguibile
Ethernet
Ethical Hacking
Exchange Server
Exploit
Extensible File Allocation Table (exFAT)
eXtensible Markup Language (XML)
Extract Transform Load (ETL)
Failover Cluster Manager (FCM)
Failover Cluster Manager Storage (FCMS)
Failover Cluster Validation Report (FCVR)
Feedback
Fiber To The Cabinet (FTTC)
Fiber To The Exchange (FTTE)
Fiber To The Home (FTTH)
Fiber To The Street (FTTS)
Fibre Channel Protocol (FCP)
File
File Allocation Table (FAT)
File batch
File Server (FS)
File Server Resource Manager (FSRM)
File Transfer Protocol (FTP)
File Transfer Protocol SSL (FTPS)
Firewall
Firma digitale
Firma elettronica
Fixed Wireless Access (FWA)
Flag
Flexible Single Master Operation (FSMO)
Floppy Disk Drive (FDD)
Follower
Formattazione
Forum
Fully Qualified Domain Name (FQDN)
Gateway
General Public License (GPL)
Gigabit (Gb)
Gigabyte (GB)
Global Area Network (GAN)
Global Catalog (GC)
Global Group (GG)
Global Positioning System (GPS)
Globally Unique Identifier (GUID)
GNU’s Not Unix (GNU)
Graphical User Interface (GUI)
Graphics Interchange Format (GIF)
Group Policy (GP)
Group Policy Object (GPO)
GUID Partition Table (GPT)
Hacker
Hard Disk Drive (HDD)
Hardware (HW)
Help desk
High Availability (HA)
High-bit-rate Digital Subscriber Line (HDSL)
High-Definition Multimedia Interface (HDMI)
Home directory
Home page
Hosting
Hotspot
Hypertext Markup Language (HTML)
Hypertext Transfer Protocol (HTTP)
Hypertext Transfer Protocol Secure (HTTPS)
Identifier (ID)
Identity Theft
Implementazione
Impostazione
Incident Response (IR)
Index
Informatica
Information and Communication Technology (ICT)
Information Technology (IT)
Information Technology Infrastructure Library (ITIL)
Information Technology Service Management (ITSM)
Informatizzazione
Infrastructure as a Service (IaaS)
Infrastruttura
Input/Output (I/O)
Institute of Electrical and Electronic Engineers (IEEE)
Instradamento
Integration Platform as a Service (iPaaS)
Intelligenza artificiale
Interfaccia
International Electrotechnical Commission (IEC)
International Organization for Standardization (ISO)
Internet
Internet Engineering Task Force (IETF)
Internet Group Management Protocol (IGMP)
Internet Information Services (IIS)
Internet of Things (IoT)
Internet Protocol (IP)
Internet Protocol Address Management (IPAM)
Internet Protocol Security (IPSec)
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Internet Relay Chat (IRC)
Internet Service Provider (ISP)
Internet Small Computer Systems Interface (iSCSI)
Intersite Topology Generator (ISTG)
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
IT Department
IT Problem Solving
Joint Photographic Experts Group (JPEG)
Joint Photographic Experts Group (JPEG) (JPG)
Joystick
Just a Bunch Of Disks (JBOD)
Kernel
Key Distribution Center (KDC)
Keyboard Video Mouse (KVM)
Keylogger
Keywords
Kilobyte (KB)
Knowledge base
Knowledge Consistency Checker (KCC)
Laptop
LDAP Data Interchange Format (LDIF)
Lightweight Directory Access Protocol (LDAP)
Linguaggi di programmazione
Link
Link Aggregation Control Protocol (LACP)
Linux
Liquid Crystal Display (LCD)
Load balancing
Local Area Network (LAN)
Local Group Policy Object (LGPO)
Log
Logical Unit Number (LUN)
Logical Volume Manager (LVM)
Login
Logout
Loop
Lorem ipsum
Machine Learning
macOS
Malware
Managed Service Account (MSA)
Managed Service Provider (MSP)
Master Boot Record (MBR)
Masterizzazione
Megabit (Mb)
Megabyte (MB)
Memoria
Metropolitan Area Network (MAN)
Micro Secure Digital (microSD)
Microsoft Certified Solutions Associate (MCSA)
Microsoft Certified Solutions Developer (MCSD)
Microsoft Certified Solutions Expert (MCSE)
Microsoft Management Console (MMC)
Microsoft Official Course (MOC)
Migrazione
Millennium bug
Minacce informatiche
Mini Serial Advanced Technology Attachment (mSATA)
Mirror
Mobile computing
Modalità provvisoria
Modding
Modelli as-a-Service
Modem
Mouse
Multiprotocol Label Switching (MPLS)
Musical Instrument Digital Interface (MIDI)
Nesting
Netbook
Network Address Translation (NAT)
Network Attached Storage (NAS)
Network Control Protocol (NCP)
Network Equipment Provider (NEP)
Network File System (NFS)
Network Interface Card (NIC)
Network Security Services (NSS)
Networking Technologies
New Technology File System (NTFS)
Next Generation Form Factor (NGFF)
Nodo
Nome utente
Non-Uniform Memory Access (NUMA)
Non-Volatile Memory Express (NVMe)
Notebook
Object Linking and Embedding (OLE)
Offline Domain Join (ODJ)
On demand
One-time password
Online e offline
On-premises software
Open Database Connectivity (ODBC)
Open Source
Operating System (OS)
Operatore
Optical Character Recognition (OCR)
Organizational Unit (OU)
Ottimizzazione
Overlay
Packet Identifier
Password
Patch
Patch panel
Path
PC Gaming
Peer to Peer (P2P)
Penetration Test
Peripheral Component Interconnect (PCI)
Peripheral Component Interconnect Express (PCIe)
Personal Area Network (PAN)
Personal Computer (PC)
Personal Identification Number (PIN)
Personal Information Manager (PIM)
Personalizzazione
Petabyte (PB)
Pharming
Phishing
Piattaforma
Platform as a Service (PaaS)
Point to Point Protocol (PPP)
Pop-up
Port forwarding
Porta
Portabilità
Portable Document Format (PDF)
Portable Network Graphics (PNG)
Post Office Protocol (POP)
Post Office Protocol version 3 (POP3)
Posta elettronica
Posta Elettronica Certificata (PEC)
PowerShell
Professional Services Automation (PSA)
Profilo utente
Programma
Programmazione
Quadricromia (CMYK)
Quality of Service (QoS)
Quinta generazione di telefonia mobile (5G)
Quorum
Random Access Memory (RAM)
Ransomware
Read Only Domain Controller (RODC)
Read Only Memory (ROM)
Real Time Business Intelligence (RTBI)
Real Time Remote Replication (RTRR)
Realtà virtuale
Reboot
Record
Recovery Point Objective (RPO)
Recovery Time Objective (RTO)
Recupero dati
Red Green Blue (RGB)
Redundant Array of Independent Disks (RAID)
Relational Database Management System (RDBMS)
Relative Distinguished Name (RDN)
Relative Identifier (RID)
Release
Remote Desktop Services (RDS)
Remote Procedure Call (RPC)
Remote Server Administration Tools (RSAT)
Rendering
Repository
Reset
Resilient File System (ReFS)
Resilienza
Restore
Retrocompatibilità
Revolutions Per Minute (RPM)
Ridondanza
Riga di comando
Rights Management Service (RMS)
Risoluzione
Rivoluzione digitale
Rollback
Root
Rootkit
Router
Sala macchine
Sala Server
Scalabilità
Scam
Scanner
Scansione
Scaricamento
Search Engine Optimization (SEO)
Secure Channel (SC)
Secure Digital (SD)
Secure Digital eXtended Capacity (SDXC)
Secure Digital High Capacity (SDHC)
Secure Shell (SSH)
Secure Sockets Layer (SSL)
Security Account Manager (SAM)
Security Identifier (SID)
Sensibile alle maiuscole
Serial Advanced Technology Attachment (SATA)
Serial Attached SCSI (SAS)
Server
Service Level Agreement (SLA)
Sessione
Sfondo
Shadow Copy
Shortcut
Sicurezza delle informazioni
Sicurezza informatica
Signup
Simple Mail Transfer Protocol (SMTP)
Simple Mail Transfer Protocol Secure (SMTPS)
Simple Network Management Protoco (SNMP)
Single In-Line Memory Module (SIMM)
Single Sign-On (SSO)
Sistema Client-Server
Sistema legacy
Sistemi Informativi Aziendali
Slot
Small Computer System Interface (SCSI)
Smart Working
Smartphone
Sniffer
Social Engineering
Socket
Software (SW)
Software as a Service (SaaS)
Solid State Drive (SSD)
Solid State Hybrid Drive (SSHD)
Spam
Spanning Tree Protocol (STP)
Spoofing
Spyware
SQL Injection
SSH File Transfer Protocol (SFTP)
Stack
Stack overflow
Stampa digitale
Stand-alone
Stand-by
Storage
Storage Area Network (SAN)
Storage Spaces Direct (S2D)
Stream
Structured Query Language (SQL)
Subnet
Switch
Symmetric Digital Subscriber Line (SDSL)
System Access Control List (SACL)
System Administrator
System Center Configuration Manager (SCCM)
System Center Operations Manager (SCOM)
System Operator (SysOp)
Tablet
Tag
Tagged Image File Format (TIFF) (TIF)
Taglia e incolla
Telematica
Template
Terabyte (TB)
Throughput
Thumbnail
Ticket
Ticket Granting Ticket (TGT)
Top-Level Domain (TLD)
Touchpad
Touchscreen
Transaction Control Language (TCL)
Transmission Control Protocol (TCP)
Trojan Horse
Troubleshooting
Trusted Platform Module (TPM)
Undo
Unified Extensible Firmware Interface (UEFI)
Unified Remote Access (URA)
Uniform Resource Locator (URL)
Uninterruptable Power Source (UPS)
Unique Identification Number
Universal Group (UG)
Universal Naming Convention (UNC)
Universal Serial Bus (USB)
Unshielded Twisted Pair (UTP)
Upload
Upstream
User Account Control (UAC)
User Datagram Protocol (UDP)
User Identifier (UID)
User Principal Name (UPN)
Username
Utente
Utilizzatore finale
Very-high-bit-rate Digital Subscriber Line (VDSL)
Video Graphics Array (VGA)
Virtual Desktop Infrastructure (VDI)
Virtual Disk Service (VDS)
Virtual Hard Disk (VHD)
Virtual Hard Disk v2 (VHDX)
Virtual Leased Line (VLL)
Virtual Local Area Network (VLAN)
Virtual Machine (VM)
Virtual Machine Manager (VMM)
Virtual Private Cloud (VPC)
Virtual Private Network (VPN)
Virtual Reality (VR)
Virtualizzazione
Virus
Voice over Internet Protocol (VoIP)
Volume Shadow Copy Service (VSS)
Wake On Lan (WOL)
Webmail
Webmaster
Wide Area Network (WAN)
Wi-Fi
Windows 10
Windows Admin Center (WAC)
Windows Installer (Microsoft Installer) (MSI)
Windows Server
Windows Server Failover Clustering (WSFC)
Windows Server Update Services (WSUS)
Wired
Wireless
Wireless Access Point (WAP)
Wireless Application Protocol (WAP)
Wizard
Workstation
World Wide Web (WWW)
Worm
Zero-day