Browse Definitions :
  • April 30, 2013 30 Apr'13

    data hygiene

    Data hygiene is the collective processes conducted to ensure the cleanliness of data. Data is considered clean if it is relatively error-free. Dirty data can be caused by a number of factors including duplicate records, incomplete or outdated data, ...  Continue Reading

  • April 30, 2013 30 Apr'13

    capacity sprawl

    Capacity sprawl, in a storage context, is a situation in which multiple, under-utilized or badly managed storage media occupy more overall space than can be justified by actual need.  Continue Reading

  • April 26, 2013 26 Apr'13

    polynomial interpolation

    Polynomial interpolation is a method of estimating values between known data points. When graphical data contains a gap, but data is available on either side of the gap or at a few specific points within the gap, an estimate of values within the gap...  Continue Reading

  • April 26, 2013 26 Apr'13

    shared storage

    Shared storage is a medium accessible by all of the subscribers in a network, intended for file storage and allowing simultaneous access by multiple subscribers without the need to duplicate files to their computers.  Continue Reading

  • April 26, 2013 26 Apr'13

    virtual NAS

    Virtual NAS is a virtual machine (VM) that acts as a file server for network-attached storage (NAS). In this context, NAS is a dedicated medium with a unique address that provides data storage services to other devices on the network.  Continue Reading

  • April 26, 2013 26 Apr'13

    Object storage: Fast Guide

    Get up to speed quickly about object storage, the role it plays in cloud storage and how it will be used in the enterprise.  Continue Reading

  • April 22, 2013 22 Apr'13

    Object Storage Glossary - Words2Go

    A handy glossary that contains definitions related to object storage.  Continue Reading

  • April 19, 2013 19 Apr'13

    Gorilla Glass 3

    Gorilla Glass 3 is a version of Corning's product for mobile device screens introduced at CES (Consumer Electronics Show) 2013.  Continue Reading

  • April 19, 2013 19 Apr'13

    Gorilla Glass

    Gorilla Glass is a scratch-resistant and durable glass product from Corning that is used to protect the screens of tablets, smartphone and other mobile devices. The glass is lightweight, strong and compatible with touch screen technologies.  Continue Reading

  • April 17, 2013 17 Apr'13

    Layer 4-7 (network services)

    Layer 4 through Layer 7 are services delivered by the upper layers of the Open Systems Interconnection (OSI) communication model. Layer 4-7 services support end-to-end communication between a source and destination application. The list of possible ...  Continue Reading

  • April 16, 2013 16 Apr'13

    converged storage

    Converged storage is the combination of storage and computing hardware and processes to speed delivery time, optimize application performance, and minimize power, cooling, and physical space requirements in virtualized and cloud-based environments.  Continue Reading

  • April 15, 2013 15 Apr'13

    zero-based thinking (ZBT)

    Zero-based thinking (ZBT) is a decision-making process based on imagining yourself back at the point before particular decisions were made, and free to make those decisions with the knowledge that you have now about their outcome.  Continue Reading

  • April 15, 2013 15 Apr'13

    virtual machine lifecycle management (VMLM)

    Virtual machine lifecycle management is a set of processes designed to help administrators oversee the implementation, delivery, operation, and maintenance of virtual machines (VMs) over the course of their existence.  Continue Reading

  • April 15, 2013 15 Apr'13

    manufactured sapphire

    Manufactured sapphire is synthetic crystalline aluminum oxide that is transparent like glass, but harder. On the Mohs mineral hardness scale of 1 to 10 (going from softest to hardest), sapphire (a form of corundum) scores 9. Ordinary glass scores 6 ...  Continue Reading

  • April 12, 2013 12 Apr'13

    virtual server farm

    A virtual server farm is a networking environment that employs multiple application and infrastructure servers running on two or more physical servers using a server virtualization program such as VMware or Microsoft Virtual Server.  Continue Reading

  • April 12, 2013 12 Apr'13

    clustered storage

    Clustered storage is the use of two or more storage servers working together to increase performance, capacity, or reliability. Clustering distributes work loads to each server, manages the transfer of workloads between servers, and provides access ...  Continue Reading

  • April 12, 2013 12 Apr'13

    Microsoft Exchange System Attendant (SA)

    Microsoft Exchange System Attendant service is software that proxies Active Directory requests and regulates internal Exchange Server functions.  Continue Reading

  • April 10, 2013 10 Apr'13

    differencing disk

    A differencing disk is a virtual hard disk (VHD) that stores changes made to another VHD or to the guest operating system.  Continue Reading

  • April 08, 2013 08 Apr'13

    STEM (science, technology, engineering, and mathematics)

    STEM is an educational program developed to prepare primary and secondary students for college and graduate study in the fields of science, technology, engineering, and mathematics (STEM). In addition to subject-specific learning, STEM aims to ...  Continue Reading

  • April 05, 2013 05 Apr'13

    hyperscale storage

    Hyperscale storage is the storage of vast quantities of information in media capable of increasing in size rapidly, efficiently, and indefinitely. In a data center, hyperscale storage capacity commonly runs into the petabytes.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close