Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.
Browse 100 - DAS
-
- 100 Gigabit Ethernet - 100 Gigabit Ethernet (100GbE) is a st...
- 100 Gigabit Ethernet (100GbE) - 100 Gigabit Etherne...
- 100GbE - 100 Gigabit Ethernet (100GbE) is a standard in development that w...
- 6to4 - 6to4 is a tunneling mechanism used to transfer IPv6 (Internet Protoco...
- Amazon Simple Storage Service - The Amazon Simple S...
- Amazon Simple Storage Service (Amazon S3)
- AMD V - AMD-V (AMD virtualization) is a set of hardware extensions for the ...
- AMD virtualization - AMD-V (AMD virtualization) is a set of ha...
- AMD-V - AMD-V (AMD virtualization) is a set of hardware extensions for the ...
- AMD-V (AMD virtualization) - AMD-V (AMD virtualization...
- application awareness - Application awareness is the capaci...
- application blacklisting - Application blacklisting, som...
- application delivery controller - An application ...
- application streaming - Application streaming is an on-dema...
- application whitelisting - Application whitelisting is a...
- ARPU - Average revenue per user or average revenue per unit (ARPU) is an exp...
- AS - On the Internet, an autonomous system (AS) is the unit of router policy, ...
- Asynchronous Pulsed Radiated Incident Light
- authentication server - An authentication server is an appl...
- auto attendant (automated attendant) - An au...
- autonomous system - On the Internet, an autonomous system (AS) ...
- autonomous system (AS) - On the Internet, an autonomous sy...
- average revenue per unit - Average revenue per user or a...
- average revenue per user - Average revenue per user or a...
- average revenue per user or average revenue per...
- backup domain controller (Windows NT) - A b...
- bare-metal provisioning - Bare-metal provisioning is the ...
- baseboard management controller - A baseboard man...
- baseboard management controller (BMC) - A b...
- BIOS attack - A BIOS attack is an exploit that infects the BIOS with ...
- BIOS rootkit - A BIOS-level rootkit is programming that exists in a ...
- Blue Cloud - Blue Cloud is an approach to shared infrastructure develo...
- blue pill rootkit - The blue pill rootkit is malware that execu...
- BMC - A baseboard management controller (BMC) is a specialized service proces...
- BRE Environmental Assessment Method - BREEAM ...
- BREEAM - BREEAM (BRE Environmental Assessment Method) is an environmental ...
- BREEAM (BRE Environmental Assessment Method)
- bring your own technology - Bring your own technology (...
- Broadband Technology Opportunities Program
- Broadband Technology Opportunities Program (BTOP)
- BTOP - The Broadband Technology Opportunities Program (BTOP) is an initiativ...
- built-in administrator account - The built-in admi...
- BYOD policy - A BYOD policy, or bring-your-own-device policy, is a se...
- BYOT - Bring your own technology (BYOT) is a policy that allows employees or...
- BYOT (bring your own technology) - Bring your ow...
- CADE - CADE (Corporate Average Data center Efficiency) is a metric used to r...
- CADE (Corporate Average Data center Efficiency)
- canonical name - A canonical name is the properly denoted host nam...
- Carrier Ethernet - Carrier Ethernet is the use of high-bandwidth...
- Certified Wireless Networking Professional
- Certified Wireless Networking Professional (CWNP)
- change request - A change request is a formal proposal for an alte...
- chatty protocol - A chatty protocol is an application or routing ...
- checkpoint - A checkpoint, in a virtualization context, is a snapshot ...
- child partition - A child partition is a logical hard drive divis...
- circular logging - Circular logging is a method of conserving ha...
- Cisco Borderless Networks - Cisco Borderless Networks i...
- Cisco Identity Services Engine - Cisco Identity Se...
- Cisco Identity Services Engine (ISE) - Cisco...
- Cisco Information Security Specialist - Cis...
- Cisco Information Security Specialist (CISS)
- Cisco Integrated Service Routers Generation 2
- Cisco Integrated Service Routers Generation 2 (...
- CISS - Cisco Information Security Specialist (CISS) is an entry-level certif...
- clean install - A clean install is a software installation in which...
- clone - A clone is an identical copy of something and is a term that first ...
- Clonezilla - Clonezilla is a free open source disk cloning application...
- cloud disaster recovery - Cloud disaster recovery (cloud ...
- cloud disaster recovery (cloud DR) - Cloud dis...
- cloud DR - Cloud disaster recovery (cloud DR) is a component of a disast...
- cloud ecosystem - Cloud ecosystem is a term used to describe the ...
- cloud storage API - A cloud storage API is an application progr...
- cloud storage gateway - A cloud storage gateway is a hardwa...
- cluster quorum disk - A cluster quorum disk is the storage me...
- CMDB - A configuration management database (CMDB) is a database that contain...
- CNA - A converged network adapter (CNA) is a single network interface card (N...
- CNAME - A CNAME specifies an alias or nickname for a canonical name record ...
- communication portal - A communication portal is a service t...
- CompTIA Cloud Essentials - CompTIA Cloud Essentials is a...
- Computing Fundamentals Learning Guides
- Conficker - Conficker is a fast-spreading worm that targets a vulnerabi...
- configuration item - A configuration management database (CMDB...
- configuration management - Configuration management (CM)...
- configuration management (CM) - Configuration manag...
- configuration management database - A configura...
- configuration management database (CMDB)
- context-aware network access control - Conte...
- converged network adapter - A converged network adapter...
- converged network adapter (CNA) - A converged net...
- Corporate Average Data center Efficiency
- corporate cloud - Private cloud (also called internal cloud) is a...
- correlation engine - A correlation engine is a software applic...
- custom domain name suffix - A custom domain name suffix...
- custom domain name suffix (custom TLD)
- custom TLD - A custom domain name suffix, or custom TLD, is a top-leve...
- CWNP - Certified Wireless Networking Professional (CWNP)is the name for the ...
- DAM - Database activity monitoring (DAM) systems monitor and record activity ...
- darknet - A darknet is a routed allocation of IP address space that is no...
- DAS - A distributed antenna system (DAS) is a way to efficiently distribute w...