Browse Definitions :
  • April 30, 2013 30 Apr'13

    data hygiene

    Data hygiene is the collective processes conducted to ensure the cleanliness of data. Data is considered clean if it is relatively error-free. Dirty data can be caused by a number of factors including duplicate records, incomplete or outdated data, ...  Continue Reading

  • April 30, 2013 30 Apr'13

    capacity sprawl

    Capacity sprawl, in a storage context, is a situation in which multiple, under-utilized or badly managed storage media occupy more overall space than can be justified by actual need.  Continue Reading

  • April 26, 2013 26 Apr'13

    polynomial interpolation

    Polynomial interpolation is a method of estimating values between known data points. When graphical data contains a gap, but data is available on either side of the gap or at a few specific points within the gap, an estimate of values within the gap...  Continue Reading

  • April 26, 2013 26 Apr'13

    shared storage

    Shared storage is a medium accessible by all of the subscribers in a network, intended for file storage and allowing simultaneous access by multiple subscribers without the need to duplicate files to their computers.  Continue Reading

  • April 26, 2013 26 Apr'13

    virtual NAS

    Virtual NAS is a virtual machine (VM) that acts as a file server for network-attached storage (NAS). In this context, NAS is a dedicated medium with a unique address that provides data storage services to other devices on the network.  Continue Reading

  • April 26, 2013 26 Apr'13

    Object storage: Fast Guide

    Get up to speed quickly about object storage, the role it plays in cloud storage and how it will be used in the enterprise.  Continue Reading

  • April 22, 2013 22 Apr'13

    Object Storage Glossary - Words2Go

    A handy glossary that contains definitions related to object storage.  Continue Reading

  • April 19, 2013 19 Apr'13

    Gorilla Glass 3

    Gorilla Glass 3 is a version of Corning's product for mobile device screens introduced at CES (Consumer Electronics Show) 2013.  Continue Reading

  • April 19, 2013 19 Apr'13

    Gorilla Glass

    Gorilla Glass is a scratch-resistant and durable glass product from Corning that is used to protect the screens of tablets, smartphone and other mobile devices. The glass is lightweight, strong and compatible with touch screen technologies.  Continue Reading

  • April 17, 2013 17 Apr'13

    Layer 4-7 (network services)

    Layer 4 through Layer 7 are services delivered by the upper layers of the Open Systems Interconnection (OSI) communication model. Layer 4-7 services support end-to-end communication between a source and destination application. The list of possible ...  Continue Reading

  • April 16, 2013 16 Apr'13

    converged storage

    Converged storage is the combination of storage and computing hardware and processes to speed delivery time, optimize application performance, and minimize power, cooling, and physical space requirements in virtualized and cloud-based environments.  Continue Reading

  • April 15, 2013 15 Apr'13

    zero-based thinking (ZBT)

    Zero-based thinking (ZBT) is a decision-making process based on imagining yourself back at the point before particular decisions were made, and free to make those decisions with the knowledge that you have now about their outcome.  Continue Reading

  • April 15, 2013 15 Apr'13

    virtual machine lifecycle management (VMLM)

    Virtual machine lifecycle management is a set of processes designed to help administrators oversee the implementation, delivery, operation, and maintenance of virtual machines (VMs) over the course of their existence.  Continue Reading

  • April 15, 2013 15 Apr'13

    manufactured sapphire

    Manufactured sapphire is synthetic crystalline aluminum oxide that is transparent like glass, but harder. On the Mohs mineral hardness scale of 1 to 10 (going from softest to hardest), sapphire (a form of corundum) scores 9. Ordinary glass scores 6 ...  Continue Reading

  • April 12, 2013 12 Apr'13

    virtual server farm

    A virtual server farm is a networking environment that employs multiple application and infrastructure servers running on two or more physical servers using a server virtualization program such as VMware or Microsoft Virtual Server.  Continue Reading

  • April 12, 2013 12 Apr'13

    clustered storage

    Clustered storage is the use of two or more storage servers working together to increase performance, capacity, or reliability. Clustering distributes work loads to each server, manages the transfer of workloads between servers, and provides access ...  Continue Reading

  • April 12, 2013 12 Apr'13

    Microsoft Exchange System Attendant (SA)

    Microsoft Exchange System Attendant service is software that proxies Active Directory requests and regulates internal Exchange Server functions.  Continue Reading

  • April 10, 2013 10 Apr'13

    differencing disk

    A differencing disk is a virtual hard disk (VHD) that stores changes made to another VHD or to the guest operating system.  Continue Reading

  • April 08, 2013 08 Apr'13

    STEM (science, technology, engineering, and mathematics)

    STEM is an educational program developed to prepare primary and secondary students for college and graduate study in the fields of science, technology, engineering, and mathematics (STEM). In addition to subject-specific learning, STEM aims to ...  Continue Reading

  • April 05, 2013 05 Apr'13

    hyperscale storage

    Hyperscale storage is the storage of vast quantities of information in media capable of increasing in size rapidly, efficiently, and indefinitely. In a data center, hyperscale storage capacity commonly runs into the petabytes.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close