Browse Definitions :
Definition

controller

Contributor(s): Ivy Wigmore

A controller, in a computing context, is a hardware device or a software program that manages or directs the flow of data between two entities. In computing, controllers may be cards, microchips or separate hardware devices for the control of a peripheral device. In a general sense, a controller can be thought of as something or someone that interfaces between two systems and manages communications between them.

Here are a few examples of controllers:

A graphics card is an integrated circuit card in a computer or, in some cases, a monitor that provides digital-to-analog conversion, video RAM, and a video controller so that data can be sent to a computer's display.

A game controller is an input device for playing games.

A network interface card (NIC) is a computer circuit board or card that is installed in a computer so that it can be connected to a network.

A WAN interface card (WIC) is a specialized network interface card that allows devices to connect to a wide area network.

A flash controller is the part of flash memory that communicates with the host device and manages the flash file directory.

An application delivery controller is a data center network device that helps manage client connections to complex Web and enterprise applications.

A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.

A session border controller (SBC) is a device or application that governs the manner in which calls, also called sessions, are initiated, conducted and terminated in a VoIP (Voice over Internet Protocol) network.

Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server to manage access to a set of network resources (applications, printers, and so forth) for a group of users.

This was last updated in October 2012

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple ...

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • primary storage (main storage)

    Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close