Browse Definitions :
  • April 07, 2015 07 Apr'15

    byte caching

    Byte caching is a method of reducing the amount of repetitious data that is sent back and forth in a network as a means of streamlining network performance.  Continue Reading

  • April 07, 2015 07 Apr'15

    WAN optimization vocabulary quiz

    Test your knowledge of essential WAN optimization terms with our 10-question quiz. See also: our WAN acceleration glossary.  Continue Reading

  • April 06, 2015 06 Apr'15

    Quick Start Glossary: WAN acceleration

    Essential terminology for WAN acceleration (WAN optimization) in a printable fast reference glossary. Online each term links to a longer definition with further links to related resources.  Continue Reading

  • April 02, 2015 02 Apr'15

    leaky bucket

    The leaky bucket is an analogy for describing how inputs and outputs work in a wide variety of business and technology contexts. The analogy is to a physical bucket with a hole in it: The bucket can hold water up to its maximum capacity and it loses...  Continue Reading

  • April 02, 2015 02 Apr'15

    leaky bucket algorithm

    The leaky bucket algorithm is used to implement traffic policing and traffic shaping in Ethernet and cellular data networks. The algorithm can also be used to control metered-bandwidth Internet connections to prevent going over the allotted ...  Continue Reading

  • April 01, 2015 01 Apr'15

    story point (story points)

    Story points are used in agile project management and development to determine the difficulty of implementing a particular story (business need). Elements considered in assigning a story point include the complexity of the story, the number of ...  Continue Reading

  • April 01, 2015 01 Apr'15

    packet coalescing

    In network adapters using Network Driver Interface Specification (NDIS) versions 6.30 and later, packet coalescing is used to group both random and multicast traffic for efficiency.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close