Browse Definitions:
  • April 30, 2013 30 Apr'13

    data hygiene

    Data hygiene is the collective processes conducted to ensure the cleanliness of data. Data is considered clean if it is relatively error-free. Dirty data can be caused by a number of factors including duplicate records, incomplete or outdated data, ...  Continue Reading

  • April 30, 2013 30 Apr'13

    capacity sprawl

    Capacity sprawl, in a storage context, is a situation in which multiple, under-utilized or badly managed storage media occupy more overall space than can be justified by actual need.  Continue Reading

  • April 26, 2013 26 Apr'13

    polynomial interpolation

    Polynomial interpolation is a method of estimating values between known data points. When graphical data contains a gap, but data is available on either side of the gap or at a few specific points within the gap, an estimate of values within the gap...  Continue Reading

  • April 26, 2013 26 Apr'13

    shared storage

    Shared storage is a medium accessible by all of the subscribers in a network, intended for file storage and allowing simultaneous access by multiple subscribers without the need to duplicate files to their computers.  Continue Reading

  • April 26, 2013 26 Apr'13

    virtual NAS

    Virtual NAS is a virtual machine (VM) that acts as a file server for network-attached storage (NAS). In this context, NAS is a dedicated medium with a unique address that provides data storage services to other devices on the network.  Continue Reading

  • April 26, 2013 26 Apr'13

    Object storage: Fast Guide

    Get up to speed quickly about object storage, the role it plays in cloud storage and how it will be used in the enterprise.  Continue Reading

  • April 22, 2013 22 Apr'13

    Object Storage Glossary - Words2Go

    A handy glossary that contains definitions related to object storage.  Continue Reading

  • April 19, 2013 19 Apr'13

    Gorilla Glass 3

    Gorilla Glass 3 is a version of Corning's product for mobile device screens introduced at CES (Consumer Electronics Show) 2013.  Continue Reading

  • April 19, 2013 19 Apr'13

    Gorilla Glass

    Gorilla Glass is a scratch-resistant and durable glass product from Corning that is used to protect the screens of tablets, smartphone and other mobile devices. The glass is lightweight, strong and compatible with touch screen technologies.  Continue Reading

  • April 17, 2013 17 Apr'13

    Layer 4-7 (network services)

    Layer 4 through Layer 7 are services delivered by the upper layers of the Open Systems Interconnection (OSI) communication model. Layer 4-7 services support end-to-end communication between a source and destination application. The list of possible ...  Continue Reading

  • April 16, 2013 16 Apr'13

    converged storage

    Converged storage is the combination of storage and computing hardware and processes to speed delivery time, optimize application performance, and minimize power, cooling, and physical space requirements in virtualized and cloud-based environments.  Continue Reading

  • April 15, 2013 15 Apr'13

    zero-based thinking (ZBT)

    Zero-based thinking (ZBT) is a decision-making process based on imagining yourself back at the point before particular decisions were made, and free to make those decisions with the knowledge that you have now about their outcome.  Continue Reading

  • April 15, 2013 15 Apr'13

    virtual machine lifecycle management (VMLM)

    Virtual machine lifecycle management is a set of processes designed to help administrators oversee the implementation, delivery, operation, and maintenance of virtual machines (VMs) over the course of their existence.  Continue Reading

  • April 15, 2013 15 Apr'13

    manufactured sapphire

    Manufactured sapphire is synthetic crystalline aluminum oxide that is transparent like glass, but harder. On the Mohs mineral hardness scale of 1 to 10 (going from softest to hardest), sapphire (a form of corundum) scores 9. Ordinary glass scores 6 ...  Continue Reading

  • April 12, 2013 12 Apr'13

    virtual server farm

    A virtual server farm is a networking environment that employs multiple application and infrastructure servers running on two or more physical servers using a server virtualization program such as VMware or Microsoft Virtual Server.  Continue Reading

  • April 12, 2013 12 Apr'13

    clustered storage

    Clustered storage is the use of two or more storage servers working together to increase performance, capacity, or reliability. Clustering distributes work loads to each server, manages the transfer of workloads between servers, and provides access ...  Continue Reading

  • April 12, 2013 12 Apr'13

    Microsoft Exchange System Attendant (SA)

    Microsoft Exchange System Attendant service is software that proxies Active Directory requests and regulates internal Exchange Server functions.  Continue Reading

  • April 10, 2013 10 Apr'13

    differencing disk

    A differencing disk is a virtual hard disk (VHD) that stores changes made to another VHD or to the guest operating system.  Continue Reading

  • April 08, 2013 08 Apr'13

    STEM (science, technology, engineering, and mathematics)

    STEM is an educational program developed to prepare primary and secondary students for college and graduate study in the fields of science, technology, engineering, and mathematics (STEM). In addition to subject-specific learning, STEM aims to ...  Continue Reading

  • April 05, 2013 05 Apr'13

    hyperscale storage

    Hyperscale storage is the storage of vast quantities of information in media capable of increasing in size rapidly, efficiently, and indefinitely. In a data center, hyperscale storage capacity commonly runs into the petabytes.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of ...

  • polymorphic virus

    A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to ...

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against ...

SearchHealthIT

  • accountable care organization (ACO)

    An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties ...

  • patient engagement

    Patient engagement is an ideal healthcare situation in which people are well-informed about -- and motivated to be involved -- in...

  • personal health record (PHR)

    A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual ...

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close