Browse Definitions:
11,850 results for:

master data

Definition | SearchDataManagement

Master data is the core data that is essential to operations in a specific business or business unit.

green networking

Definition | SearchNetworking

Green networking is the practice of selecting energy-efficient networking technologies and products, and minimizing resource use whenever possible.


Definition | SearchNetworking

A balun is a device that joins a balanced line (one that has two conductors, with equal currents in opposite directions, such as a twisted pair cable...

branch office box (BOB)

Definition | SearchNetworking

A Branch Office Box (BOB) is a server appliance that has been optimized to provide distributed support for simple utility functions that are required...


Definition | SearchNetworking

A brouter (pronounced BRAU-tuhr or sometimes BEE-rau-tuhr) is a network bridge and a router combined in a single product.

Transport Services Access Point (TSAP)

Definition | SearchNetworking

A Transport Services Access Point (TSAP) is an end-point for communication between the Transport layer (layer 4) and the Session layer in the OSI (...


Definition | SearchNetworking

The V Series Recommendations from the ITU-TS are summarized in the table below.

Primary Rate Interface (PRI)

Definition | SearchNetworking

In the Integrated Services Digital Network (ISDN), there are two levels of service: the Basic Rate Interface (BRI), intended for the home and small ...

SIGTRAN (Signaling Transport)

Definition | SearchNetworking

SIGTRAN (for Signaling Transport) is the standard telephony protocol used to transport Signaling System 7 (SS7) signals over the Internet.

CIDR (Classless Inter-Domain Routing or supernetting)

Definition | SearchNetworking

CIDR (Classless Inter-Domain Routing) is a way to allocate Internet addresses more flexibly than the original system of Internet Protocol (IP) ...



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.