Browse Definitions :

Data Center Management

Definitions used in data center management, including hardware, virtualization and cloud computing.

Cloud computing

Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.

  • Hadoop

    Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems.

  • usage-based pricing

    Usage-based pricing is a consumption-based pricing model in which customers are only charged when they use a product or service. Typically, the customer is billed at the end of the billing cycle.

  • open API (public API)

    An open API, also known as a public API, is an application programming interface made publically available to software developers.

View All Cloud computing Definitions

Converged infrastructure

This WhatIs.com glossary contains definitions related to converged infrastructure and the integrated systems market.

  • network convergence

    Network convergence is the efficient coexistence of telephone, video and data communication within a single network.

  • single pane of glass

    A single pane of glass is a management console that presents data from multiple sources in a unified display. The glass, in this case, is a computer monitor or mobile device screen.

  • DataCore

    DataCore is a software-defined storage (SDS) company, as well as an early storage virtualization software vendor, in Fort Lauderdale, Fla.

View All Converged infrastructure Definitions Back to Top

Data center management

Terms related to data centers, including definitions about network operations centers (NOCs) and words and phrases about the storage, management and the transmission of data.

  • JAVA_HOME

    JAVA_HOME is an operating system (OS) environment variable which can optionally be set after either the Java Development Kit (JDK) or the Java Runtime Environment (JRE) is installed.

  • static hashing

    Static hashing is a method of hashing, or shortening a string of characters in computer programming, in which the set of shortened characters remains the same length to improve the ease with which data can be accessed.

  • hybrid database

    A hybrid database is a type of real-time database system that uses both on-disk and in-memory data storage by deciding which is most suitable for a given task.

View All Data center management Definitions Back to Top

Disaster recovery

This WhatIs.com glossary contains terms related to disaster recovery and business continuity.

  • data protection

    Data protection is the process of safeguarding important information from corruption, compromise or loss.

  • Full Backup

    A full backup is the process of making at least one additional copy of all data files that an organization wishes to protect in a single backup operation.

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.

View All Disaster recovery Definitions Back to Top

Hardware

Terms related to computer hardware, including definitions about cables, connectors and power supply units and words and phrases about computing peripheral devices including the keyboard, mouse, audio speakers, and printers.

  • parallel processing

    Parallel processing is a method in computing of running two or more processors (CPUs) to handle separate parts of an overall task.

  • LCD (Liquid Crystal Display)

    LCD (Liquid Crystal Display) is a type of flat panel display which uses liquid crystals in its primary form of operation.

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining active on infected systems.

View All Hardware Definitions Back to Top

IT Operations

Terms related to the processes and services implemented and managed by an organization’s information technology (IT) department. Topics covered include systems management, configuration management, API management and DevOps, as well as real-time performance monitoring and management.

  • configuration management (CM)

    Configuration management (CM) is a governance and systems engineering process for ensuring consistency in an operational environment.

  • Amazon Elastic Container Registry (Amazon ECR)

    Amazon Elastic Container Registry (Amazon ECR) is an AWS product that stores, manages and deploys Docker images, which are managed clusters of Elastic Compute Cloud (EC2) instances.

  • automated testing

    Automated testing is a process that validates if software is functioning appropriately and meeting requirements before it is released into production.

View All IT Operations Definitions Back to Top

Storage hardware

Terms related to storage hardware, including definitions about solid state drives and words and phrases about hard disk drives, tape drives, disk arrays and tiered storage.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • LCD (Liquid Crystal Display)

    LCD (Liquid Crystal Display) is a type of flat panel display which uses liquid crystals in its primary form of operation.

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

View All Storage hardware Definitions Back to Top

Virtualization

Terms related to virtualization, including definitions about virtualization technologies and words and phrases about server virtualization, desktop virtualization and storage virtualization.

  • Hadoop

    Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems.

  • VPN (virtual private network)

    A virtual private network (VPN) is programming that creates a safe, encrypted connection over a less secure network, such as the public internet. A VPN uses tunneling protocols to encrypt data at the sending end and decrypt it at the receiving end.

  • VLAN (virtual LAN)

    A VLAN (virtual LAN) is a subnetwork which can group together collections of devices on separate physical local area networks (LANs).

View All Virtualization Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close