Browse Definitions :

Word of the Day

Routing Information Protocol (RIP)

RIP (Routing Information Protocol) is a protocol used to enable routers to share information about IP traffic routes as they move traffic within a larger network made up of separate LANs linked through routers.See More

Word of the Day Archive

Newest and Updated Terms

Know-IT-All

Buzzword Alert

autonomous system (AS)

On the Internet, an autonomous system (AS) is the unit of router policy, either a single network or a group of networks that is controlled by a common network administrator (or group of administrators) on behalf of a single administrative entity (such as a university, a business enterprise, or a business division).

Read More

Essential Knowledge

What is the difference between TCP/IP model and OSI model?

Our expert discusses the differences between the OSI model and the TCP/IP model, and he maps out how they relate to each other in network ...

How does software-defined access work?

Service providers and enterprises use software-defined access to extend SDN beyond the data center and WAN to the edge of the network. Learn about ...

4 switch ASIC interfaces to drive SDN and machine learning growth

Learn how four interfaces that are designed to control switch ASICs and packet forwarding can help accelerate developments in SDN and machine ...

802.11ax standard promises tectonic shift in wireless

It's shiny, bright and new -- and, like 'Anchorman' Ron Burgundy, kind of a big deal. Here's why networking experts say high-efficiency 802.11ax ...

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

  • WPA3

    WPA3, also known as Wi-Fi Protected Access 3, is the third version of the security certification program developed by the Wi-Fi ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

Close