0 - 24
24/7 Phone Support
Round-the-clock support (24 hours a day/7 days a week).
The 2-factor authentication process makes use of two factors in order to identify a user. As a rule, the first factor describes something that the user knows (e.g. the user name and password) and the second factor describes something that the user possesses (e.g. the safety code generator).
Programming Interface (Application Programming Interface)
An API provides standardized information from a part of a program, which can be absorbed by any number of other program parts and used for further processing. This separation enables the program parts to be developed independently, as long as the API remains unchanged.
Hosting via the Internet, in which the users share servers and other data center services, thus saving costs, as only the modules actually used (servers, computing power, infrastructure, etc.) have to be paid for.
CPU block of a processor
A "core" can refer to completely different processor generations, particularly in service offerings and price quotations. ProfitBricks defines "core" as a real core of the latest processor generations from companies such as Intel and AMD, in other words, with the maximum productive efficiency.
Computer center, in-house, either in your own company or as a virtual center in the cloud, as a service from IaaS providers such as ProfitBricks.
Data Center Colocation
Server housing or server homing
Accommodation and network connection of a customer server in the data center of an Internet Service Provider (ISP). This means that, in contrast to hosting, the operating system is not made available by the provider, but that the provider only ensures the framework for operating system supply.
Data Center Designer (DCD)
The tool specially developed by ProfitBricks, which you can use to configure and manage your own virtual data center.
Dedicated Server/Dedicated Hosting
Servers/hosts assigned and directly rented to the customer/user, which usually have to be paid for over the rented period, regardless of how much is actually used.
Security device for network systems
A firewall monitors the data traffic that transverses it and decides whether certain data/network packages should be allowed to pass through it or not, based on defined rules. In this manner, the firewall attempts to prevent unauthorized network access.
High Speed Connectivity
A fast data connection.
Infrastructure as a Service
Use of all data center services, such as server and infrastructure, via the Internet. IaaS offerings are provided as cloud services and maintained professionally by IaaS providers. They offer a variety of possible applications, from a one-off application as required, to avoiding peak loads, idle capacities, expensive hardware acquisition, etc.
A network/communication link technology based on switched-fabric topology, which offers high throughput, low latency, quality of service and failover.
Interconnection/connection of networks.
Input/output performance, performance of hard drives and storage solutions with regard to reading and writing speeds.
Transfer of data between servers in a network and via the Internet.
Server load distribution, method for distributing the load between several separate hosts in the network.
Platform as a Service
Use of a computer platform via the Internet, provided by a PaaS supplier. PaaS offerings provide a runtime environment for web applications that can be deployed quickly and with a low amount of administrative effort, without the need for purchasing the underlying hardware and software.
Professional Level System Administrator
Experienced, professional system administrators, such as those used by ProfitBricks for development and service.
Comparable, functionally equivalent systems running in parallel
This means that a functionally equivalent or comparable system is also available, and thus ensures trouble-free and stable operation at all times.
Software as a Service
Use of software via the Internet, which is supplied and kept up to date by a SaaS provider as a service.
Service Engineer Team/System Engineer Team
Experienced system administrators are available in the service team.
Network protocol or corresponding programs, which can be used to establish an encrypted network connection with a remote device in a secure manner
Secure Sockets Layer
Description of predecessor of TLS (Transport Layer Security), a hybrid encryption protocol for secure data transmission in the Internet, which has been called TLS since Version 3.0