What Does That Mean (WDTM)

Ever hear a bunch of IT people start talking in acronyms, use phrases, words, or adages and have no clue what they mean...This page is dedicated to providing definitions.

Technical Acronyms

Acronym Meaning Definition or usage
IP Internet Protocol The IP address of the computer is 192.168.1.1
DHCP Dynamic Host Configuration Protocol A network protocol that automatically assigns IP addresses and other configuration information to devices on a network. DHCP will assign a device an IP address when it is on the network.
DNS Domain Name System A system that translates domain names into IP addresses. One of Google's public DNS IPv4 addresses is 8.8.8.8
WAP Wireless Access Point A device that allows wireless devices to connect to a wired network. Can be easily confused with a particular song but the term Wireless Access Point is commonly used in networking.
PEAP Protected Extensible Authentication Protocol A security protocol that protects wireless and wired networks by authenticating clients
WPA Wi-Fi Protected Access A security protocol that protects wireless networks from unauthorized access
BGP Border Gateway Protocol A set of rules that allows the internet to exchange routing information between autonomous systems
ARP Address Resolution Protocol A network communication protocol that translates IP addresses into MAC addresses
MFA Multi-Factor Authentication A security feature that requires more than one form of authentication to access an account
2FA Two-Factor Authentication A security method that requires two forms of identification to access a system or application
OTP One-Time Password A security code that's only valid for one login attempt or transaction. Used as a second authentication factor in addition to a username and password
TOTP Time based One-Time Password A common form of two-factor authentication (2FA)
OAuth Open Authorization A widely adopted authorization framework that allows you to consent to an application interacting with another on your behalf without having to reveal your password
FIDO Fast Identity Online A set of open, standardized authentication protocols intended to ultimately eliminate the use of passwords for authentication
OS Operating Systems
OOBE Out-of-the-box Experience The experience a user has when setting up a product for the first time
DISM Deployment Image Servicing and Management Tool A command-line tool that allows users to service Windows images, including repairing them or modifying installation media
SFC System File Checker Windows computer not acting right? Let me run sfc /scannow
WMI Windows Management Instrumentation A Microsoft framework that allows users to manage and access system resources on Windows-based operating systems
PxE Pre-boot execution environment A client-server standard that allows a computer to load an operating system (OS) over a network connection
ADK Assessment and Deployment Kit A collection of tools and documentation that allows users to customize, assess, and deploy Windows operating systems
MECM Microsoft Endpoint Configuration Manager A management tool that helps IT administrators manage Windows devices, servers, and mobile devices
MEM Microsoft Endpoint Manager A management tool that helps IT administrators manage Windows devices, servers, and mobile devices
MBAM Microsoft BitLocker Administration and Monitoring A tool that helps manage BitLocker Drive Encryption
BDE BitLocker Drive Encrypting The volume encryption used by Microsoft Windows
BL BitLocker A Windows security feature that encrypts a device's hard drive to protect data from unauthorized access
FDE Full Disk Encryption A security method for protecting sensitive data at the hardware level by encrypting all data on a disk drive
FV FileVault A security feature on Mac computers that encrypts data to protect it from being accessed or copied
CCM Client Configuration Manager A device that has the Configuration Manager client software installed on it
CDN Content Delivery Network A group of servers that work together to deliver web content to users by storing it on servers that are closer to the user's location
DMZ Demilitarized Zone A physical or logical sub-network that protects an organization's internal network from untrusted traffic
AVD Azure Virtual Desktop A cloud-based service that provides access to virtualized desktops and applications
PIM Privileged Identity Management A security solution that helps organizations manage and monitor access to critical resources
MDM Mobile Device Management A security software that allows organizations to manage and secure mobile devices that connect to their networks
DEP Device Enrollment Program A program that allows organizations to manage iOS devices, Mac computers, and Apple TV. DEP can make it easier to set up and configure devices, and to provide additional restrictions and features
ABM Apple Business Manager A web-based portal that allows IT administrators to centrally manage Apple devices (like iPhones, iPads, Macs) within an organization, including purchasing apps in bulk, creating managed Apple IDs for employees, and deploying devices seamlessly by integrating with a Mobile Device Management (MDM) solution
ASM Apple School Manager A web-based tool that helps IT administrators manage Apple devices and content for educational institutions
PAM Privileged Access Management A cybersecurity strategy that protects sensitive data and critical systems
RMM Remote Monitoring and Management A technology that allows IT professionals to remotely monitor and manage a company's IT infrastructure and devices
ABI Always be imaging
SLA Service Level Agreement I need to ABC to keep my SLA's down
ABC Always be closing Refers to closing tickets. My SLA's are great cause I ABC!
AI Artificial Intelligence
sudo Superuser do or Substitute user do A command-line utility that allows users to run programs with elevated privileges on Unix-like operating systems, such as Linux and macOS
AV Anti-Virus Software designed to detect and destory computer viruses
DLP Data Loss Prevention A collection of tools and strategies that help organizations protect sensitive data
SSH Secure Shell A network protocol that allows two computers to communicate and share data securely over an unsecured network
RDP Remote Desktop Protocol A Microsoft-developed network communication protocol that allows users to remotely access and control other computers
SFTP Secure File Transfer Protocol A network protocol that allows users to securely transfer, access, and manage files
SMTP Simple Mail Transfer Protocol A set of rules that govern how emails are sent and received over the internet
SaaS Software as a Service A cloud-based model for delivering software applications to users over the internet
AAD Azure Active Directory
ADFS Active Directory Federation Services
GPO Group Policy Object
CA Conditional Access or Certificate Authority Conditional Access is a set of policies and configurations that control which devices and users can access assorted services and data sources. Certificate Authority is a trusted entity that verifies the digital identity of websites, individuals, or organizations by issuing digital certificates.
DFS Directory File System DFS is a data storage and management scheme that allows users to access files from multiple networked servers.
PS PowerShell
CMD Command Prompt
NIST National Institute of Standards and Technology
DevOps Developer Operations
BYOD Bring your own device
FIDO Fast Identity Online
ANC Active Noice Canceling
RHEL Red Hat Enterprise Linux
QA Quality Assurance
DR Disaster Recovery
API Application Programming Interface
DRM Digital Rights Management
GPS Global Positioning System
AR Augmented Reality A technology that enhances the real world by overlaying digital information on top of the user's view
VR Virtual Reality A computer-generated environment that simulates reality, allowing users to interact with it in a realistic way
KB Knowledge Base A centralized repository of information, usually organized and searchable, that provides quick access to specific knowledge or answers to questions on a particular topic, often used to help customers solve problems or employees find guidance related to a product or service; essentially, it acts like an online library of information readily accessible to users
BLE Bluetooth Low Energy A wireless technology that uses less energy than traditional Bluetooth
AWS Amazon Web Services A cloud computing platform that offers IT infrastructure services to businesses
MHz Megahertz Used to measure the speed of computer processing, electromagnetic (EM) frequencies, and alternating current
GHz Gigahertz
MB Megabyte a unit of measurement for computer memory or file size
Mbps Megabits per second A unit of measurement for data transfer speed, like internet upload and download speeds
GB Gigabyte
GBps Gigabits per second
TB Terabyte
ELA Enterprise License Agreement A contract between a customer and a vendor that gives the customer access to the vendor's services for a set period of time at a fixed price
EULA End User License Agreement A legal contract between a software developer and its users that outlines the rules for using the software
HTML HyperText Markup Language code used to structure and define the content of a web page
SA System Administrator or Server Administrator
DP Distribution Point Distribution points are servers used to host files for distribution to computers and mobile devices
GUID Globally Unique Identifier A 128-bit string of characters that uniquely identifies a digital entity
IFTTT If this, then that A private commercial company that runs services that allow a user to program a response to events in the world

General Acronyms

Acronym Meaning Phrases
ELI5 Explain Like I'm 5 ELI5 these terms and conditions
WDTM What does that mean
WDYM What do you mean
IKR I know right
IYKYK If you know you know
WFH Work from home
ETA Estimated Time of Arrival
AFD Away from desk
RTO Return to office
YSA For your situational awareness
AMA Ask me anything
FTFY Fixed that for you
TIL Today I learned
TIA Thanks in Advance
YSK You should know
YMMV Your milage may vary
OP Original poster
TLDR Too long: didn't read
NGL Not gonna lie
BRB Be right back
NSFW Not safe for work Let's maybe not open that Reddit thread with the NSFW label on your computer.
SFW Safe for work
WTFT What the french toast The SFW word instead of WTF
WTH What the hell or what the heck
AFAIK As far as I know
IMO or IMHO In my opinion / In my honest or humble opinion
IIRC If I remember correctly
IRL In real life
RTM Read the manual or Return to merchandiser
SMH Shaking my head
LMGTFY Let me google that for you
GOAT Greatest of all time Patrick Mahomes is the GOAT.
WIP Work in progress
WIR Week in review
LPT Life Pro Tip
LARP Live Actioin Role Play
KISS Keep It Simple, Stupid A design principle that emphasizes simplicity and avoiding complexity in systems and designs
OOO Out of Office A term used to let coworkers, clients, or other employees know that you're not available and can't be reached

Adages

Adage Meaning Phrases
Mea Culpa An acknowledgment of one's fault or error
You are never too old to learn Learning is a lifelong process and is not limited to youth
Red herring Something intended to divert attention from the real problem or matter at hand; a misleading clue This error in the logs is a red herring
Shift Left

1. Practice of moving testing, quality, and performance evaluation early in the development process, often before any code is written.

2. A concept that aims to shorten resolution times and reduce costs by solving issues earlier in the support process.

DevOp Words

Word Meaning
Agile
Technical Debt
Swarm