Browse Definitions :

Cloud Computing

Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.

CHA - CLO

  • Chaos Monkey - Chaos Monkey is a software tool that was developed by Netflix engineers to test the resiliency and recoverability of their Amazon Web Services (AWS).
  • Chef (software) - Chef is an open source systems management and cloud infrastructure automation platform.
  • Chromebook - Google Chromebook is a thin client laptop that is configured with the Chrome operating system (Chrome OS).
  • Cisco Borderless Networks - Cisco Borderless Networks is the brand name for a set of hardware and software technologies which allow "anyone, anywhere, anytime, and on any device" to connect to an organization's network.
  • Cisco Cloud Builder - Cisco Cloud Builder is one of three tracks within the Cisco Cloud Partner Program.
  • Cisco Cloud Partner Program - The Cisco Cloud Partner Program is an initiative by Cisco to help its channel partners enter the cloud computing marketplace.
  • Citrix certfication - Citrix certification is a training offering from Citrix designed to verify learning in an area of expertise with the company's cloud computing solutions.
  • Citrix Cloud - Citrix Cloud is a workspace management tool IT can use to deliver resources, including virtual desktops and apps, to users from a public or private cloud, on-premises deployment, or all three.
  • Citrix Cloud Provider Program - The Citrix Cloud Provider Program is an invitation-only partner program for cloud computing service providers.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Twofish

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile data storage device.

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

Close