Browse Definitions :

Data center management

Terms related to data centers, including definitions about network operations centers (NOCs) and words and phrases about the storage, management and the transmission of data.

TRA - ZOM

  • transaction monitoring (business transaction management) - Transaction monitoring, also known as business transaction management, is the supervision of critical business applications and services by auditing the individual transactions that flow across the application infrastructure.
  • turbine - A turbine is a machine that transforms rotational energy from a fluid that is picked up by a rotor system into usable work or energy.
  • twin server (0.5 U server) - A twin server has two compute nodes housed side-by-side in 1U of data center rack space.
  • two-phase commit (2PC) - Two-phase commit (2PC) is a standardized protocol that ensures atomicity, consistency, isolation and durability (ACID) of a transaction; it is an atomic commitment protocol for distributed systems.
  • uncloud (cloud repatriation) - Unclouding, also called cloud repatriation, is the retrieval of applications and data from a cloud computing platform.
  • unified computing system (UCS) - A unified computing system (UCS) is is a converged data center architecture that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
  • uninterruptible power supply (UPS) - An uninterruptible power supply (UPS) is a device that allows a computer to keep running for at least a short time when the primary power source is lost.
  • United Kingdom Climate Change Act - The United Kingdom Climate Change Act is the world's first legally binding environmental sustainability framework.
  • utility storage - Utility storage is a service model in which a provider makes storage capacity available to an individual, an organization or a business unit on a pay-per-use basis.
  • VersaStack - VersaStack is a converged infrastructure reference architecture developed as a collaborative effort of IBM and Cisco.
  • virtual desktop - A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.
  • virtual LUN or thin LUN - A virtual LUN (virtual logical unit number) is a representation of a storage area that is not tied to any physical storage allocation.
  • virtual power plant - A virtual power plant is the combination of numerous solar-powered, battery-backed homes delivering excess power back into the grid to provide power for other locations.
  • virtual SAN appliance (VSA) - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
  • virtualization sprawl (VM sprawl) - Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where the administrator can no longer manage them effectively.
  • virtualization stack - A virtualization stack is the collection of resources that, along with the hypervisor, make up the Microsoft Hyper-V environment.
  • VMware backup - VMware backup is the copying of data on a virtual machine (VM) in a VMware environment to prevent data loss.
  • VSPEX BLUE - VSPEX™ BLUE is a hyper-converged appliance from EMC Corporation that includes compute, memory and storage resources in a single device.
  • WAN accelerator - A WAN accelerator is an appliance that improves the end user's experience on a wide area network (WAN).
  • waste heat recovery - Waste heat recovery is the collection of heat created as an undesired by-product of the operation of a piece of equipment or machinery to fill a desired purpose elsewhere.
  • water cooling - In computers, water cooling is a method used to lower the temperatures of computer processors, and sometimes other components such as graphics cards, using water rather than air as the cooling medium.
  • WebSphere - WebSphere is a set of Java-based tools from IBM that allow customers to create and manage sophisticated business Web sites.
  • Websphere MQ - Websphere MQ, formerly known as MQ (message queue) series, is an IBM standard for program-to-program messaging across multiple platforms.
  • white box server - A white box server is a generic server made from commercially available retail computer parts.
  • wind farm - A wind farm or wind park is a grouping of wind turbines in an area.
  • wind power - Wind power is the kinetic energy of wind, harnessed and redirected to perform a task mechanically or to generate electrical power.
  • wind turbine - A wind turbine is a power generating device that is driven by the kinetic energy of the wind.
  • Windows Server 2012 (WS 2012) - Windows Server 2012, formerly codenamed Windows Server 8, is the latest version of Windows Server.
  • Windows Server Core - Windows Server Core is a minimal installation option for the Windows Server operating system (OS) that has no GUI and only includes the components required to perform server roles and run applications.
  • workload automation - Workload automation is the practice of using software to schedule, initiate, run and manage tasks related to business processes and transactions.
  • WUE (water usage effectiveness) - WUE (water usage effectiveness) is a metric developed by The Green Grid nonprofit consortium to help data centers measure how much water a facility uses for cooling and other building needs.
  • Zenoss - Zenoss is a company that develops hybrid IT monitoring analytics software for visibility in cloud, virtual and physical IT environments.
  • zero client - Zero client, also known as ultrathin client, is a server-based computing model in which the end user's computing device has no local storage.
  • zinc whiskers - Zinc whiskers are tiny growths of elemental zinc that form on the surfaces of objects that are electroplated, or galvanized, with zinc.
  • zombie server (comatose server) - A zombie server, also known as a comatose server, is one that is plugged in and drawing power but not performing any work and possibly not detectable other than physically.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close