This Content Component encountered an error

Browse Definitions by Alphabet

This Content Component encountered an error
SearchCompliance
SearchSecurity
  • screened subnet

    A screened subnet, or triple-homed firewall, refers to a network architecture where a single firewall is used with three network ...

  • metamorphic and polymorphic malware

    Metamorphic and polymorphic malware are two types of malicious software (malware) that can change their code as they propagate ...

  • security identifier (SID)

    In the context of Windows computing and Microsoft Active Directory (AD), a security identifier (SID) is a unique value that is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Cloud Data Management Interface (CDMI)

    The Cloud Data Management Interface (CDMI) is an international standard that defines a functional interface that applications use...

  • NAND flash wear-out

    NAND flash wear-out is the breakdown of the oxide layer within the floating gate transistors of NAND flash memory.

  • write endurance

    Write endurance is the number of program/erase (P/E) cycles that can be applied to a block of flash memory before the storage ...

Close