Browse Definitions:
Definition

controller

Contributor(s): Ivy Wigmore

A controller, in a computing context, is a hardware device or a software program that manages or directs the flow of data between two entities. In computing, controllers may be cards, microchips or separate hardware devices for the control of a peripheral device. In a general sense, a controller can be thought of as something or someone that interfaces between two systems and manages communications between them.

Here are a few examples of controllers:

A graphics card is an integrated circuit card in a computer or, in some cases, a monitor that provides digital-to-analog conversion, video RAM, and a video controller so that data can be sent to a computer's display.

A game controller is an input device for playing games.

A network interface card (NIC) is a computer circuit board or card that is installed in a computer so that it can be connected to a network.

A WAN interface card (WIC) is a specialized network interface card that allows devices to connect to a wide area network.

A flash controller is the part of flash memory that communicates with the host device and manages the flash file directory.

An application delivery controller is a data center network device that helps manage client connections to complex Web and enterprise applications.

A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.

A session border controller (SBC) is a device or application that governs the manner in which calls, also called sessions, are initiated, conducted and terminated in a VoIP (Voice over Internet Protocol) network.

Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server to manage access to a set of network resources (applications, printers, and so forth) for a group of users.

This was last updated in October 2012

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchSecurity

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

  • Trojan horse (computing)

    In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • SSD TRIM

    SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state ...

  • cloud storage service

    A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a ...

  • cloud hosting

    Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close