Browse Definitions :

Network management

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

100 - DIS

  • 100 Gigabit Ethernet (100GbE) - 100 Gigabit Ethernet (100GbE) is a standard in development that will enable the transfer of Ethernet frames at 100 gigabits per second (gp/s).
  • 6to4 - 6to4 is a tunneling mechanism used to transfer IPv6 (Internet Protocol version 6) packets over an IPv4 infrastructure, typically the IPv4 Internet.
  • acceptable use policy (AUP) - An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet.
  • Amazon CloudWatch - Amazon CloudWatch is a component of Amazon Web Services (AWS) that provides monitoring for AWS resources and the customer applications running on the Amazon infrastructure.
  • Amazon S3 - Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service designed for online backup and archiving of data and applications on Amazon Web Services.
  • AMD-V (AMD virtualization) - AMD-V (AMD virtualization) is a set of hardware extensions for the X86 processor architecture.
  • application awareness - Application awareness is the capacity of a system to maintain information about connected applications to optimize their operation and that of any subsystems that they run or control.
  • application blacklisting - Application blacklisting, sometimes just referred to as blacklisting, is a network administration practice used to prevent the execution of undesirable programs.
  • application delivery controller (ADC) - An application delivery controller (ADC) is a network component that manages and optimizes how client machines connect to web and enterprise application servers.
  • application streaming - Application streaming is an on-demand software delivery model that takes advantage of the fact that most applications require only a small fraction of their total program code to run.
  • application whitelisting - Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all other applications from running.
  • Asynchronous Pulsed Radiated Incident Light - Asynchronous Pulsed Radiated Incident Light is a multi-duplicitous communication protocol (MDCP) used to configure wireless local area networks (WLANs) on the fly.
  • attack surface - An attack surface is the total sum of the vulnerabilities that can be used to carry out a security exploit.
  • authentication server - An authentication server is an application that facilitates authentication of an entity that attempts to access a network.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • autonomous system (AS) - On the Internet, an autonomous system (AS) is the unit of router policy, either a single network or a group of networks that is controlled by a common network administrator (or group of administrators) on behalf of a single administrative entity (such as a university, a business enterprise, or a business division).
  • average revenue per user or average revenue per unit (ARPU) - Average revenue per user or average revenue per unit (ARPU) is an expression of the income generated by a typical subscriber or device per unit time in a telecommunications network.
  • Avro (Apache Avro) - Apache Avro project is a row oriented object container storage format for Hadoop as well as a remote procedure call and data serialization framework.
  • backup domain controller (Windows NT) - A backup domain controller (BDC) is a role a Windows NT computer takes on to help manage access to network resources.
  • bandwidth test (testing your bandwidth) - A bandwidth test is a program that sends one or more files of known size over a network to a distant computer (for example, your own computer), measures the time required for the file(s) to successfully download at the destination, and thereby obtains a theoretical figure for the data speed between two or more points, usually in kilobits per second (Kbps) or megabits per second (Mbps).
  • banner grabbing - Banner grabbing is the act of capturing the information provided by banners, configurable text-based welcome screens from network hosts that generally display system information.
  • banner screen - A banner screen is a configurable text “welcome” display from a network host system.
  • bare-metal provisioning - Bare-metal provisioning is the process of installing an operating system (OS) or Type 1 hypervisor directly on a computer's hardware.
  • baseboard management controller (BMC) - A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.
  • BIOS attack - A BIOS attack is an exploit that infects the BIOS with malicious code and is persistent through reboots and attempts to reflash the firmware.
  • BIOS rootkit - A BIOS-level rootkit is programming that exists in a system's memory hardware to enable remote administration.
  • blacklist - A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network.
  • Blue Cloud - Blue Cloud is an approach to shared infrastructure developed by IBM.
  • blue pill rootkit - The blue pill rootkit is malware that executes as a hypervisor to gain control of computer resources.
  • boot storm - A boot storm is what happens when a lot of end users log on to their computers at the same time.
  • BREEAM (BRE Environmental Assessment Method) - BREEAM (BRE Environmental Assessment Method) is an environmental standard that rates the sustainability of buildings in the UK.
  • Broadband Technology Opportunities Program (BTOP) - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • built-in administrator account - The built-in administrator account is the first account created when an OS is installed on a new standalone server, member server or workstation.
  • BYOD policy - A BYOD policy, or bring-your-own-device policy, is a set of rules governing a corporate IT department’s level of support for employee-owned PCs, smartphones and tablets.
  • BYOT (bring your own technology) - Bring your own technology (BYOT) is a policy that allows employees or students to use their own personal electronic devices at work or scho.
  • byte caching - Byte caching is a method of reducing the amount of repetitious data that is sent back and forth in a network as a means of streamlining network performance.
  • CADE (Corporate Average Data center Efficiency) - CADE (Corporate Average Data center Efficiency) is a metric used to rate the overall energy efficiency of an organization's data centers.
  • canonical name - A canonical name is the properly denoted host name of a computer or network server.
  • Carrier Ethernet - Carrier Ethernet is the use of high-bandwidth Ethernet technology for Internet access and for communication among business, academic and government local area networks (LANs).
  • Certified Wireless Networking Professional (CWNP) - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
  • change request - A change request is a formal proposal for an alteration to some product or system.
  • Chaos Monkey - Chaos Monkey is a software tool that was developed by Netflix engineers to test the resiliency and recoverability of their Amazon Web Services (AWS).
  • chatty protocol - A chatty protocol is an application or routing protocol that requires a client or server to wait for an acknowledgement before it can transmit again.
  • checkpoint - A checkpoint, in a virtualization context, is a snapshot of the state of a virtual machine.
  • chief integration officer (CIO) - A chief integration officer (CIO) is a corporate executive in charge of ensuring the coordination of all interacting systems within the enterprise and its extended environments.
  • child partition - A child partition is a logical hard drive division in the Microsoft Hyper-V environment that runs an isolated operating system.
  • circular logging - Circular logging is a method of conserving hard disk space in the Microsoft Exchange transactional logging process.
  • Cisco Borderless Networks - Cisco Borderless Networks is the brand name for a set of hardware and software technologies which allow "anyone, anywhere, anytime, and on any device" to connect to an organization's network.
  • Cisco Identity Services Engine (ISE) - Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
  • Cisco Information Security Specialist (CISS) - Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network.
  • Cisco Integrated Service Routers Generation 2 (ISR G2) - ISR G2 is a second generation Integrated Services Router (ISR) from Cisco Systems, Inc.
  • clean install - A clean install is a software installation in which any previous version is removed.
  • clone - A clone is an identical copy of something and is a term that first became familiar to the public from the biosciences.
  • Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
  • Clos network - A Clos network is a type of non-blocking, multistage switching architecture that reduces the number of ports required in an interconnected fabric.
  • cloud disaster recovery (cloud DR) - Cloud disaster recovery (cloud DR) is a backup and restore strategy that involves storing and maintaining copies of electronic records in a cloud computing environment as a security measure.
  • cloud ecosystem - A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.
  • cloud service latency - Latency greatly affects how usable and enjoyable devices and communications are.
  • cloud storage API - A cloud storage API is an application program interface that connects a locally-based application to a cloud-based storage system, so that a user can send data to it and access and work with data stored in it.
  • cloud storage gateway - A cloud storage gateway is a hardware- or software-based appliance that serves as a bridge between local applications and remote cloud-based storage.
  • CloudWatch (Amazon CloudWatch) - Amazon CloudWatch is a component of Amazon Web Services (AWS) that provides monitoring for AWS resources and the customer applications running on the Amazon infrastructure.
  • cluster quorum disk - A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network.
  • CMDB (configuration management database) - A configuration management database (CMDB) is a database that contains all relevant information about the hardware and software components used in an organization's IT services and the relationships between those components.
  • CNAME - A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database.
  • command prompt - A command prompt is the input field in a text-based user interface screen for an operating system or program.
  • communication portal - A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media.
  • CompTIA Cloud Essentials - CompTIA Cloud Essentials is an entry-level, vendor-neutral cloud certification.
  • computer network - A a computer network, also referred to as a data network, is a series of points or nodes interconnected by communication paths for transmitting, receiving and exchanging data, voice and video traffic.
  • Conficker - Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems.
  • configuration management (CM) - Configuration management (CM) is a governance and systems engineering process for ensuring consistency in an operational environment.
  • content-addressed memory (CAM) - Content-addressable memory (CAM) is computer memory that operates like a hardware search engine for search-intensive applications.
  • context-aware network access control - Context-aware network access control (CANAC) is an approach to managing the security of a proprietary network by granting access to network resources according to contextual-based security policies.
  • converged network adapter (CNA) - A converged network adapter (CNA) is a single network interface card (NIC) that contains both a Fibre Channel (FC) host bus adapter (HBA) and a TCP/IP Ethernet NIC.
  • COPE (corporate-owned, personally-enabled) - COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones.
  • correlation engine - A correlation engine is a software application that programmatically understands relationships.
  • custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • CYOD (choose your own device) - CYOD (choose your own device) is an alternative model to BYOD (bring your own device) that involves allowing employees to select the device they want from among a limited number of options.
  • darknet - A darknet is a routed allocation of IP address space that is not discoverable by any usual means.
  • data breach - A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.
  • data center bridging (DCB) - DCB is a suite of IEEE standards designed to enable lossless transport over Ethernet and a converged network for all data center applications.
  • data center services - Data center services is a collective term for the supporting components necessary for the proper operation of a repository for storage, management and dissemination of data organized around a body of knowledge or pertaining to an enterprise.
  • data protection management (DPM) - Data protection management (DPM) is the administration of backup processes to ensure that tasks run on schedule, and that data is securely backed up and recoverable.
  • data reduction - Data reduction is the process of reducing the amount of capacity required to store data.
  • database activity monitoring (DAM) - Database activity monitoring (DAM) systems monitor and record activity in a database and then generate alerts for anything unusual.
  • delay-tolerant network - A delay-tolerant network is a network designed to operate effectively over extreme distances such as those encountered in space communications or on an interplanetary scale.
  • desktop management - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system instance from the client that is used to access it.
  • device as a service - Device as a service is the offering of PCs, smart phones and other mobile compute devices as a paid service.
  • DirectAccess - DirectAccess is a feature introduced in Windows Server 2008 R2 and Windows 7 that uses automated IPv6 and IPSec tunnels to allow remote users to access private network resources whenever they are connected to the Internet.
  • Directory Services Restore Mode (DSRM) - Directory Services Restore Mode (DSRM) is a safe mode boot option for Windows Server domain controllers.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close