Browse Definitions :

Data center management

Terms related to data centers, including definitions about network operations centers (NOCs) and words and phrases about the storage, management and the transmission of data.

TES - ZOM

  • Tesla Powerpack - Tesla Powerpack and Powerwall are, respectively, the company’s business and residential market rechargeable battery products, designed for large-scale energy storage for off-grid and supplemental power systems.
  • Tesla Powerwall - Powerwall, which is aimed at the residential market, is designed to store power generated by solar panels or wind turbines at peak time for use during power outages and out-of-peak time, including night.
  • The Green Grid - The Green Grid is a nonprofit consortium whose mission is to become the global authority on resource efficiency in information technology and data centers.
  • The Green Grid Performance Indicator (PI) - The Green Grid Performance Indicator (PI) is a set of metrics designed to help information technology (IT) teams assess current and future data center cooling performance.
  • the Open19 project - The Open19 project is aimed at standardizing servers, storage and networking components into a common set of form factors for any Electronic Industries Association (EIA) 19-inch data center rack.
  • thermoelectric cooling - Thermoelectric cooling is a way to remove thermal energy from a medium, device or component by applying a voltage of constant polarity to a junction between dissimilar electrical conductors or semiconductors.
  • tidal power - Tidal energy is the generation of clean electricity by harnessing potential energy of the shifting water in ocean tides.
  • tin whiskers - Tin whiskers are individual crystals of tin that grow spontaneously from a tinned surface, usually as a result of stress of some sort.
  • transaction monitoring (business transaction management) - Transaction monitoring, also known as business transaction management, is the supervision of critical business applications and services by auditing the individual transactions that flow across the application infrastructure.
  • turbine - A turbine is a machine that transforms rotational energy from a fluid that is picked up by a rotor system into usable work or energy.
  • twin server (0.5 U server) - A twin server has two compute nodes housed side-by-side in 1U of data center rack space.
  • two-phase commit (2PC) - Two-phase commit (2PC) is a standardized protocol that ensures atomicity, consistency, isolation and durability (ACID) of a transaction; it is an atomic commitment protocol for distributed systems.
  • uncloud (cloud repatriation) - Unclouding, also called cloud repatriation, is the retrieval of applications and data from a cloud computing platform.
  • unified computing system (UCS) - A unified computing system (UCS) is is a converged data center architecture that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
  • uninterruptible power supply (UPS) - An uninterruptible power supply (UPS) is a device that allows a computer to keep running for at least a short time when the primary power source is lost.
  • United Kingdom Climate Change Act - The United Kingdom Climate Change Act is the world's first legally binding environmental sustainability framework.
  • utility storage - Utility storage is a service model in which a provider makes storage capacity available to an individual, an organization or a business unit on a pay-per-use basis.
  • VersaStack - VersaStack is a converged infrastructure reference architecture developed as a collaborative effort of IBM and Cisco.
  • virtual desktop - A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.
  • virtual LUN or thin LUN - A virtual LUN (virtual logical unit number) is a representation of a storage area that is not tied to any physical storage allocation.
  • virtual power plant - A virtual power plant is the combination of numerous solar-powered, battery-backed homes delivering excess power back into the grid to provide power for other locations.
  • virtual SAN appliance (VSA) - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
  • virtualization sprawl (VM sprawl) - Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where the administrator can no longer manage them effectively.
  • virtualization stack - A virtualization stack is the collection of resources that, along with the hypervisor, make up the Microsoft Hyper-V environment.
  • VMware backup - VMware backup is the copying of data on a virtual machine (VM) in a VMware environment to prevent data loss.
  • VSPEX BLUE - VSPEX™ BLUE is a hyper-converged appliance from EMC Corporation that includes compute, memory and storage resources in a single device.
  • WAN accelerator - A WAN accelerator is an appliance that improves the end user's experience on a wide area network (WAN).
  • waste heat recovery - Waste heat recovery is the collection of heat created as an undesired by-product of the operation of a piece of equipment or machinery to fill a desired purpose elsewhere.
  • water cooling - In computers, water cooling is a method used to lower the temperatures of computer processors, and sometimes other components such as graphics cards, using water rather than air as the cooling medium.
  • WebSphere - WebSphere is a set of Java-based tools from IBM that allow customers to create and manage sophisticated business Web sites.
  • Websphere MQ - Websphere MQ, formerly known as MQ (message queue) series, is an IBM standard for program-to-program messaging across multiple platforms.
  • white box server - A white box server is a generic server made from commercially available retail computer parts.
  • wind farm - A wind farm or wind park is a grouping of wind turbines in an area.
  • wind power - Wind power is the kinetic energy of wind, harnessed and redirected to perform a task mechanically or to generate electrical power.
  • wind turbine - A wind turbine is a power generating device that is driven by the kinetic energy of the wind.
  • Windows Server 2012 (WS 2012) - Windows Server 2012, formerly codenamed Windows Server 8, is the latest version of Windows Server.
  • Windows Server Core - Windows Server Core is a minimal installation option for the Windows Server operating system (OS) that has no GUI and only includes the components required to perform server roles and run applications.
  • workload automation - Workload automation is the practice of using software to schedule, initiate, run and manage tasks related to business processes and transactions.
  • WUE (water usage effectiveness) - WUE (water usage effectiveness) is a metric developed by The Green Grid nonprofit consortium to help data centers measure how much water a facility uses for cooling and other building needs.
  • zAware - zAware is a mainframe monitor for IBM’s zEnterprise EC12 mainframe server.
  • Zenoss - Zenoss is a company that develops hybrid IT monitoring analytics software for visibility in cloud, virtual and physical IT environments.
  • zero client - Zero client, also known as ultrathin client, is a server-based computing model in which the end user has no local software and very little hardware.
  • zinc whiskers - Zinc whiskers are tiny growths of elemental zinc that form on the surfaces of objects that are electroplated, or galvanized, with zinc.
  • zombie server (comatose server) - A zombie server, also known as a comatose server, is one that is plugged in and drawing power but not performing any work and possibly not detectable other than physically.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close