Browse Definitions :
  • April 30, 2013 30 Apr'13

    data hygiene

    Data hygiene is the collective processes conducted to ensure the cleanliness of data. Data is considered clean if it is relatively error-free. Dirty data can be caused by a number of factors including duplicate records, incomplete or outdated data, ...  Continue Reading

  • April 30, 2013 30 Apr'13

    capacity sprawl

    Capacity sprawl, in a storage context, is a situation in which multiple, under-utilized or badly managed storage media occupy more overall space than can be justified by actual need.  Continue Reading

  • April 26, 2013 26 Apr'13

    polynomial interpolation

    Polynomial interpolation is a method of estimating values between known data points. When graphical data contains a gap, but data is available on either side of the gap or at a few specific points within the gap, an estimate of values within the gap...  Continue Reading

  • April 26, 2013 26 Apr'13

    shared storage

    Shared storage is a medium accessible by all of the subscribers in a network, intended for file storage and allowing simultaneous access by multiple subscribers without the need to duplicate files to their computers.  Continue Reading

  • April 26, 2013 26 Apr'13

    virtual NAS

    Virtual NAS is a virtual machine (VM) that acts as a file server for network-attached storage (NAS). In this context, NAS is a dedicated medium with a unique address that provides data storage services to other devices on the network.  Continue Reading

  • April 26, 2013 26 Apr'13

    Object storage: Fast Guide

    Get up to speed quickly about object storage, the role it plays in cloud storage and how it will be used in the enterprise.  Continue Reading

  • April 22, 2013 22 Apr'13

    Object Storage Glossary - Words2Go

    A handy glossary that contains definitions related to object storage.  Continue Reading

  • April 19, 2013 19 Apr'13

    Gorilla Glass 3

    Gorilla Glass 3 is a version of Corning's product for mobile device screens introduced at CES (Consumer Electronics Show) 2013.  Continue Reading

  • April 19, 2013 19 Apr'13

    Gorilla Glass

    Gorilla Glass is a scratch-resistant and durable glass product from Corning that is used to protect the screens of tablets, smartphone and other mobile devices. The glass is lightweight, strong and compatible with touch screen technologies.  Continue Reading

  • April 17, 2013 17 Apr'13

    Layer 4-7 (network services)

    Layer 4 through Layer 7 are services delivered by the upper layers of the Open Systems Interconnection (OSI) communication model. Layer 4-7 services support end-to-end communication between a source and destination application. The list of possible ...  Continue Reading

  • April 16, 2013 16 Apr'13

    converged storage

    Converged storage is the combination of storage and computing hardware and processes to speed delivery time, optimize application performance, and minimize power, cooling, and physical space requirements in virtualized and cloud-based environments.  Continue Reading

  • April 15, 2013 15 Apr'13

    zero-based thinking (ZBT)

    Zero-based thinking (ZBT) is a decision-making process based on imagining yourself back at the point before particular decisions were made, and free to make those decisions with the knowledge that you have now about their outcome.  Continue Reading

  • April 15, 2013 15 Apr'13

    virtual machine lifecycle management (VMLM)

    Virtual machine lifecycle management is a set of processes designed to help administrators oversee the implementation, delivery, operation, and maintenance of virtual machines (VMs) over the course of their existence.  Continue Reading

  • April 15, 2013 15 Apr'13

    manufactured sapphire

    Manufactured sapphire is synthetic crystalline aluminum oxide that is transparent like glass, but harder. On the Mohs mineral hardness scale of 1 to 10 (going from softest to hardest), sapphire (a form of corundum) scores 9. Ordinary glass scores 6 ...  Continue Reading

  • April 12, 2013 12 Apr'13

    virtual server farm

    A virtual server farm is a networking environment that employs multiple application and infrastructure servers running on two or more physical servers using a server virtualization program such as VMware or Microsoft Virtual Server.  Continue Reading

  • April 12, 2013 12 Apr'13

    clustered storage

    Clustered storage is the use of two or more storage servers working together to increase performance, capacity, or reliability. Clustering distributes work loads to each server, manages the transfer of workloads between servers, and provides access ...  Continue Reading

  • April 12, 2013 12 Apr'13

    Microsoft Exchange System Attendant (SA)

    Microsoft Exchange System Attendant service is software that proxies Active Directory requests and regulates internal Exchange Server functions.  Continue Reading

  • April 10, 2013 10 Apr'13

    differencing disk

    A differencing disk is a virtual hard disk (VHD) that stores changes made to another VHD or to the guest operating system.  Continue Reading

  • April 08, 2013 08 Apr'13

    STEM (science, technology, engineering, and mathematics)

    STEM is an educational program developed to prepare primary and secondary students for college and graduate study in the fields of science, technology, engineering, and mathematics (STEM). In addition to subject-specific learning, STEM aims to ...  Continue Reading

  • April 05, 2013 05 Apr'13

    hyperscale storage

    Hyperscale storage is the storage of vast quantities of information in media capable of increasing in size rapidly, efficiently, and indefinitely. In a data center, hyperscale storage capacity commonly runs into the petabytes.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close