= Programming Interface (Application Programming Interface). An API provides standardized information from a part of a program, which can be absorbed by any number of other program parts and used for further processing. This separation enables the program parts to be developed independently, as long as the API remains unchanged.

Cloud Hosting

Hosting via the Internet, in which the users share servers and other data center services, thus saving costs, as only the modules actually used (servers, computing power, infrastructure, etc.) have to be paid for.


= CPU block of a processor. A "core" can refer to completely different processor generations, particularly in service offerings and price quotations. ProfitBricks defines "core" as a real core of the latest processor generations from companies such as Intel and AMD, in other words, with the maximum productive efficiency.

Core Technology Choice

"Core Technology Choice" is a unique feature that makes it possible to flexibly change the processor architecture per virtual instance. The following CPU types are available: Intel® Xeon® or AMD Opteron™.

Data Center

Computer center, in-house, either in your own company or as a virtual center in the cloud, as a service from IaaS providers such as ProfitBricks.

Data Center Colocation

=Server housing or server homing. Accommodation and network connection of a customer server in the data center of an Internet Service Provider (ISP). This means that, in contrast to hosting, the operating system is not made available by the provider, but that the provider only ensures the framework for operating system supply.

Data Center Designer (DCD)

The tool specially developed by ProfitBricks, which you can use to configure and manage your own virtual data center.

Dedicated Server/Dedicated Hosting

Servers/hosts assigned and directly rented to the customer/user, which usually have to be paid for over the rented period, regardless of how much is actually used.


= Security device for network systems. A firewall monitors the data traffic that transverses it and decides whether certain data/network packages should be allowed to pass through it or not, based on defined rules. In this manner, the firewall attempts to prevent unauthorized network access.

High Speed Connectivity

A fast data connection.


= Infrastructure as a Service. Use of all data center services, such as server and infrastructure, via the Internet. IaaS offerings are provided as cloud services and maintained professionally by IaaS providers. They offer a variety of possible applications, from a one-off application as required, to avoiding peak loads, idle capacities, expensive hardware acquisition, etc.


A network/communication link technology based on switched-fabric topology, which offers high throughput, low latency, quality of service and failover.


Interconnection/connection of networks.

IO Performance

Input/output performance, performance of hard drives and storage solutions with regard to reading and writing speeds.

IP Routing

Transfer of data between servers in a network and via the Internet.

Load Balancer

Server load distribution, method for distributing the load between several separate hosts in the network.


= Platform as a Service. Use of a computer platform via the Internet, provided by a PaaS supplier. PaaS offerings provide a runtime environment for web applications that can be deployed quickly and with a low amount of administrative effort, without the need for purchasing the underlying hardware and software.

Phone Support 24/7

Round-the-clock support (24 hours a day/7 days a week).


= Professional Level System Administrator. Experienced, professional system administrators, such as those used by ProfitBricks for development and service.

Redundance Systems

Comparable, functionally equivalent systems running in parallel. This means that a functionally equivalent or comparable system is also available, and thus ensures trouble-free and stable operation at all times.


= Software as a Service. Use of software via the Internet, which is supplied and kept up to date by a SaaS provider as a service.

Service Engineer Team/System Engineer Team

= Experienced system administrators are available in the service team.


= Secure Shell. Network protocol or corresponding programs, which can be used to establish an encrypted network connection with a remote device in a secure manner.


= Secure Sockets Layer. Description of predecessor of TLS (Transport Layer Security), a hybrid encryption protocol for secure data transmission in the Internet, which has been called TLS since Version 3.0.

Two-Factor Authentication

= The 2-factor authentication method uses two factors to identify a user. As a rule, the first factor describes something that the user knows (eg, user name and password), and the second factor is something that the user has (for example, security code generator).