Browse Definitions :

Network management

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

DIS - LOG

  • disaggregated server - A disaggregated server is a server that breaks up components and resources into subsystems.
  • discrete event simulation (DES) - Discrete event simulation (DES) is the process of codifying the behavior of a complex system as an ordered sequence of well-defined events.
  • disk cloning - Disk cloning is the act of copying the contents of a computer's hard drive.
  • disk image - A disk image is a copy of the entire contents of a storage device, such as a hard drive, DVD, or CD.
  • Diskpart (Disk Partition Utility) - Diskpart is a command-line utility used to manipulate disk partitions in all versions of Windows and Windows Server beginning with Windows XP and Windows Server 2003.
  • disruption-tolerant network (DTN) - A disruption-tolerant network (DTN) is a network designed so that temporary or intermittent communications problems, limitations and anomalies have the least possible adverse impact.
  • distributed - Computing is said to be "distributed" when the computer programming and data that computers work on are spread out over more than one computer, usually over a network.
  • distributed antenna system (DAS) - A distributed antenna system (DAS) is a way to deal with isolated spots of poor coverage inside a large building by installing a network of relatively small antennas throughout the building to serve as repeaters.
  • distributed virtual switch - A distributed virtual switch is an abstract representation of multiple hosts defining the same name, network policy and port group.
  • DMI (Desktop Management Interface) - Desktop Management Interface (DMI) is an industry framework for managing and keeping track of hardware and software components in a system of personal computers from a central location.
  • DNS rebinding attack - DNS rebinding is an exploit in which the attacker uses JavaScript in a malicious Web page to gain control of the victim's router.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • DNS Security Extensions (DNSSEC) - DNS Security Extensions (DNSSEC) are a set of Internet Engineering Task Force (IETF) standards created to address vulnerabilities in the Domain Name System (DNS) and protect it from online threats.
  • dot-green - Dot-green is a shorthand way of describing the green computing movement that includes both hype and real innovation.
  • DOVE (IBM DOVE) - IBM Dove (Distributed Overlay Virtual Ethernet) is an architecture that allows a network engineer to abstract the physical network infrastructure from hypervisor hosts and make network changes in software rather than hardware.
  • drive-by pharming - Drive-by pharming is a vulnerability exploitation method in which the attacker takes advantage of an inadequately unprotected broadband router to gain access to user data.
  • eavesdropping - Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
  • economizer - An economizer is a mechanical device used to reduce energy consumption.
  • ECOphlex (PHase-change Liquid EXchange) - ECOphlex (PHase-change Liquid EXchange) is an efficient and environmentally-friendly computer component cooling technology.
  • EMC Corporation - EMC Corporation was a multinational provider of products and services related to cloud computing, storage, big data, data analytics, information security, content management and converged infrastructure.
  • employee monitoring - Employee monitoring is the use of various methods of workplace surveillance to gather information about the activities and locations of staff members.
  • end user policy - An end user policy is a set of directives that describes what actions employees must take -- or avoid -- in order to protect corporate assets.
  • endpoint device - An endpoint device is an Internet-capable computer hardware device on a TCP/IP network.
  • endpoint fingerprinting - Endpoint fingerprinting is a feature of enterprise network access control (NAC) products that enables discovery, classification and monitoring of connected devices, including non-traditional network endpoints such as smartcard readers, HVAC systems, medical equipment and IP-enabled door locks.
  • endpoint security management - Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.
  • Energy Star - Energy Star is a government-backed labeling program that helps people and organizations save money and reduce greenhouse gas emissions by identifying factories, office equipment, home appliances and electronics that have superior energy efficiency.
  • Enterprise Device Alliance (EDA) - The Enterprise Device Alliance (EDA) seeks to help administrators integrate iOS and Android devices into existing Windows environments.
  • Enterprise Service Bus (ESB) - An enterprise service bus (ESB) is a middleware tool used to distribute work among connected components of an application.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event forwarding - Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers.
  • event handler - An event handler is a callback routine that operates asynchronously and handles inputs received into a program.
  • event handling - Event handling is the receipt of an event at some event handler from an event producer and subsequent processes.
  • Event log management software (ELMS) - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • fault management - Fault management is the component of network management concerned with detecting, isolating and resolving problems.
  • FCAPS (fault-management, configuration, accounting, performance, and security) - FCAPS is a network management framework created by the International Organization for Standardization (ISO).
  • femtocell - A femtocell is a wireless access point that improves cellular reception inside a home or office building.
  • Firesheep - Firesheep is a Firefox plug-in that automates session hijacking attacks over unsecured Wi-Fi networks.
  • fixed-length subnet mask (FLSM) - A fixed-length subnet mask (FLSM) is a sequence of numbers of unchanging length that streamlines packet routing within the subnets of a proprietary network.
  • Flexible Mandatory Access Control (FMAC) - Flexible Mandatory Access Control (FMAC) is an ongoing project intended to enhance the Sun Microsystems OpenSolaris operating platform by adding two security technologies: Flux Advanced Security Kernel (Flask) and Type Enforcement (TE).
  • forensic - Forensic, in a general sense, means "related to or used in courts of law" or "used for formal public debate or discussion.
  • four-way server - A four-way server is a server that incorporates a multi-core processor for increased performance.
  • free/busy data - Free/busy data is information about the availability of individuals within an organization at specified times.
  • full-disk encryption (FDE) - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.
  • GDMO (Guidelines for Definition of Managed Objects) - GDMO (Guidelines for Definition of Managed Objects) is a standard for defining objects in a network in a consistent way.
  • geolocation - Geolocation is the detection of the physical location of an Internet connected computing device.
  • global catalog (Active Directory) - A global catalog is a data storage source containing partial representations of objects found in a multidomain Active Directory Domain Services (ADDS) forest.
  • golden image - A golden image is a template for a virtual machine (VM), virtual desktop, server or hard disk drive.
  • Good Technology - Good Technology is a mobile security platform provider headquartered in Sunnyvale, California.
  • gpresult - Gpresult is a command-line tool that shows the RSoP (Resultant Set of Policy) for a user or computer based on applied Group Policy settings.
  • graceful degradation - Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.
  • green networking - Green networking is the practice of selecting energy-efficient networking technologies and products, and minimizing resource use whenever possible.
  • Group Policy - Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers.
  • Group Policy Preferences - Group Policy Preferences are a set of extensions, introduced in Windows Server 2008, that increase the functionality of Group Policy Objects.
  • guest virtual machine (guest VM) - A guest virtual machine (guest VM) is the software component of a virtual machine (VM), an independent instance of an operating system (called a guest operating system) and its associated software and information.
  • hard reset (factory reset; master reset) - A hard reset, also known as a factory reset or master reset, is the restoration of a device, such as a smartphone or tablet, to its state when it left the factory.
  • HashiCorp - HashiCorp is a software company that provides a suite of modular DevOps infrastructure provisioning and management products.
  • Health IT (health information technology) - Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of information systems for the healthcare industry.
  • Heartbeat - Heartbeat is a program that runs specialized scripts automatically whenever a system is initialized or rebooted.
  • hop - In a packet-switching network, a hop is the trip a data packet takes from one router or intermediate point to another in the network.
  • host virtual machine (host VM) - A host virtual machine is the server component of a virtual machine (VM), the underlying hardware that provides computing resources to support a particular guest virtual machine (guest VM).
  • hosted services - Hosted services are applications, IT infrastructure components or functions that organizations access from external service providers, typically through an internet connection.
  • hot spare - A hot spare, also called a hot standby, is a backup component that can be placed into service immediately when a primary component fails.
  • How do I...choose a VPN for my small business? - A virtual private network (VPN)is a way to use a public telecommunication infrastructure, such as the Internet,to provide remote offices or individual users with secure access to their organization's network.
  • HPE OneView (formerly HP OneView) - HPE OneView, formerly known as HP OneView, is a converged infrastructure management platform that provides a unified interface for the administration of software-defined systems in a data center.
  • hyper-hybrid cloud - A hyper-hybrid cloud is a complex distributed environment involving multiple and diverse interconnected public and private clouds, often from multiple providers.
  • I/O contention (input/output contention) - I/O contention (input/output contention), occurs when virtual machines compete for I/O resources because there is a limited storage bandwidth.
  • Identity of Things (IDoT) - The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.
  • ImageX - ImageX is a command-line tool that allows an administrator to capture an image of an entire hard disk drive and its files and folders in a single Windows Imaging Format (WIM) file.
  • incident - An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.
  • inline deduplication - Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
  • Instant Messaging: Glossary - This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.
  • integrated stack - An integrated stack is a vendor product that provides an enterprise information technology (IT) customer with a scalable network, storage and server infrastructure that comes pre-loaded with virtualization, automation and management software.
  • Intel VT (Virtualization Technology) - Intel VT (Virtualization Technology) is the company's hardware assistance for processors running virtualization platforms.
  • intelligent video - Intelligent video is digital video technology integrated with analytical software.
  • intent-based networking (IBN) - Intent-based networking (IBN) is a form of network administration that incorporates artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network.
  • Internet Group Management Protocol (IGMP) - The Internet Group Management Protocol (IGMP) is an Internet protocol that provides a way for an Internet computer to report its multicast group membership to adjacent routers.
  • interrupt vector - An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.
  • inverse multiplexing over ATM (IMA) - Inverse multiplexing over ATM (IMA) is a method of optimizing the data transfer rate for individual subscribers in networks that use asynchronous transfer mode (ATM) by dividing the data into multiple concurrent streams that are sent across separate channels and reconstructed at the destination, obtaining the original data stream.
  • Iometer - Iometer allows users to set custom input/output profiles to simulate different application workloads for testing.
  • IP address management (IPAM) - Internet Protocol address management (IPAM) is a method of tracking and modifying the information associated with a network's Internet Protocol address (IP address) space.
  • IP Multimedia Subsystem (IMS) - The IP Multimedia Subsystem (IMS) is a concept for an integrated network of telecommunications carriers that would facilitate the use of IP (Internet Protocol) for packet communications in all known forms over wireless or landline.
  • IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
  • IPX (Internetwork Packet Exchange) - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
  • ISO/IEC 38500 - ISO/IEC 38500 is an international standard created to guide corporate governance of information technology (IT).
  • ISSU (in-service software upgrade) - An ISSU (in-service software upgrade) is a technique for updating software on a network device without taking that device offline and thereby disrupting network services.
  • IT as a Service (ITaaS) - IT as a Service (ITaaS) is a technology-delivery method that treats IT (information technology) as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.
  • IT incident report - An IT incident report is documentation of an event that has disrupted the normal operation of some IT system (or that had the potential to do so) and how that situation was handled.
  • IT operations - IT operations are the processes and services administered by an organization’s information technology (IT) department.
  • IT operations analytics (ITOA) - IT operations analytics (ITOA) is the practice of monitoring systems and gathering, processing and interpreting data from various operations sources to guide decisions and predict potential issues.
  • IT operations management (ITOM) - IT operations management (ITOM) is the administrative area involving technology infrastructure components and the requirements of individual applications, services, storage, networking and connectivity elements within an organization.
  • IT/OT convergence - IT/OT convergence is the integration of information technology (IT) systems used for data-centric computing with operational technology (OT) systems used to monitor events, processes and devices and make adjustments in enterprise and industrial operations.
  • KnujOn - KnujOn is an interactive Web-based spam reporting service.
  • LAN-free backup - LAN-free backup is the process of backing up server data to a centralized storage device rather than moving it across a local-area network (LAN).
  • LANDesk Client Manager (LDCM) - LDCM (LANDesk Client Manager) is a software product from Intel that lets a system administrator for a local area network () see the configurations and monitor the status of personal computer on the LAN.
  • latency - In a computer system, latency usually refers to any delay or waiting that causes noticeable increases of real or perceived response time.
  • link-load balancer (link balancer) - A link load balancer, also called a link balancer, is a network appliance that distributes in-bound and out-bound traffic to and from multiple Internet Service Providers (ISPs) links.
  • local wipe - Local wipe, also known as auto-wipe, is deletion of a device's data which is initiated by software on the device itself, rather than through remote administration.
  • locked down device (LDD) - A locked down device (LDD) is a mobile device, typically a smartphone, that is shipped by a vendor with the ability to accept only the SIM card that originally came with it.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems -- including hardware, software and data -- from cyberattacks.

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close