Browse Definitions:
15 results for:

csma

CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)

Definition | SearchNetworking

CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.11 networks.

Carrier Sense Multiple Access/Collision Detect (CSMA/CD)

Definition | SearchNetworking

Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.

slot time

Definition | SearchNetworking

In Ethernet and its Carrier Sense Multiple Access/Collision Detect (CSMA/CD) approach to managing which device can use the communication link next, ...

10 gigabit Ethernet (10 GbE)

Definition | SearchNetworking

10 gigabit Ethernet is a telecommunication technology that offers data speeds up to 10 billion bits per second. It differs from traditional Ethernet ...

collision

Definition | SearchNetworking

In a half duplex Ethernet network, a collision is the result of two devices on the same network attempting to transmit data at exactly the same time.

802.11

Definition | SearchMobileComputing

802.11 is an evolving family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical ...

media access management

Definition | SearchNetworking

In the Open Systems Interconnection (OSI) communication reference model, media access management is performed by the Media Access Control (MAC) ...

802.11b

Definition | SearchMobileComputing

The 802.11b standard for wireless local area networks (WLANs) - often called Wi-Fi - is part of the 802.11 series of WLAN standards from the ...

wireless LAN (WLAN or Wireless Local Area Network)

Definition | SearchMobileComputing

A wireless LAN is one in which a mobile user can connect to a local area network (LAN) through a wireless (radio) connection.

Aloha (Aloha method)

Definition | SearchNetworking

Aloha, also called the Aloha method, refers toa simple communications scheme in which each source (transmitter) in a network sends data wheneverthere...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • object storage

    Object storage, also called object-based storage, is an approach to addressing and manipulating units of storage called objects, ...

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close