Browse Definitions :
  • April 07, 2015 07 Apr'15

    byte caching

    Byte caching is a method of reducing the amount of repetitious data that is sent back and forth in a network as a means of streamlining network performance.  Continue Reading

  • April 07, 2015 07 Apr'15

    WAN optimization vocabulary quiz

    Test your knowledge of essential WAN optimization terms with our 10-question quiz. See also: our WAN acceleration glossary.  Continue Reading

  • April 06, 2015 06 Apr'15

    Quick Start Glossary: WAN acceleration

    Essential terminology for WAN acceleration (WAN optimization) in a printable fast reference glossary. Online each term links to a longer definition with further links to related resources.  Continue Reading

  • April 02, 2015 02 Apr'15

    leaky bucket

    The leaky bucket is an analogy for describing how inputs and outputs work in a wide variety of business and technology contexts. The analogy is to a physical bucket with a hole in it: The bucket can hold water up to its maximum capacity and it loses...  Continue Reading

  • April 02, 2015 02 Apr'15

    leaky bucket algorithm

    The leaky bucket algorithm is used to implement traffic policing and traffic shaping in Ethernet and cellular data networks. The algorithm can also be used to control metered-bandwidth Internet connections to prevent going over the allotted ...  Continue Reading

  • April 01, 2015 01 Apr'15

    story point (story points)

    Story points are used in agile project management and development to determine the difficulty of implementing a particular story (business need). Elements considered in assigning a story point include the complexity of the story, the number of ...  Continue Reading

  • April 01, 2015 01 Apr'15

    packet coalescing

    In network adapters using Network Driver Interface Specification (NDIS) versions 6.30 and later, packet coalescing is used to group both random and multicast traffic for efficiency.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

  • Australian Assistance and Access Bill

    The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider.