Browse Definitions :

Network Mgmt

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

ENT - NET

  • Enterprise Device Alliance (EDA) - The Enterprise Device Alliance (EDA) seeks to help administrators integrate iOS and Android devices into existing Windows environments.
  • Enterprise Service Bus (ESB) - An enterprise service bus (ESB) is a software platform used to distribute work among connected components of an application.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event forwarding - Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers.
  • event handler - An event handler is a callback routine that operates asynchronously and handles inputs received into a program.
  • event handling - Event handling is the receipt of an event at some event handler from an event producer and subsequent processes.
  • Event log management software (ELMS) - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • fault management - Fault management is the component of network management concerned with detecting, isolating and resolving problems.
  • FCAPS (fault, configuration, accounting, performance and security) - FCAPS (fault, configuration, accounting, performance and security) is a network management framework created by the International Organization for Standardization (ISO).
  • Firesheep - Firesheep is a Firefox plug-in that automates session hijacking attacks over unsecured Wi-Fi networks.
  • fixed-length subnet mask (FLSM) - A fixed-length subnet mask (FLSM) refers to a type of enterprise or provider networking where a block of IP addresses is divided into multiple subnets of equal length (i.
  • full-disk encryption (FDE) - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.
  • geolocation - Geolocation is the detection of the physical location of an Internet connected computing device.
  • global catalog (Active Directory) - A global catalog is a data storage source containing partial representations of objects found in a multidomain Active Directory Domain Services (ADDS) forest.
  • golden image - A golden image is a template for a virtual machine (VM), virtual desktop, server or hard disk drive.
  • Good Technology - Good Technology is a mobile security platform provider headquartered in Sunnyvale, California.
  • gpresult - Gpresult is a command-line tool that shows the RSoP (Resultant Set of Policy) for a user or computer based on applied Group Policy settings.
  • graceful degradation - Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.
  • green networking - Green networking is the practice of selecting energy-efficient networking technologies and products, and minimizing resource use whenever possible.
  • Group Policy - Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers.
  • Group Policy Preferences - Group Policy Preferences are a set of extensions, introduced in Windows Server 2008, that increase the functionality of Group Policy Objects.
  • guest virtual machine (guest VM) - A guest virtual machine (guest VM) is the software component of a virtual machine (VM), an independent instance of an operating system (called a guest operating system) and its associated software and information.
  • hard reset (factory reset; master reset) - A hard reset, also known as a factory reset or master reset, is the restoration of a device, such as a smartphone or tablet, to its state when it left the factory.
  • HashiCorp - HashiCorp is a software company that provides a suite of modular DevOps infrastructure provisioning and management products.
  • Health IT (health information technology) - Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of information systems for the healthcare industry.
  • Heartbeat - Heartbeat is a program that runs specialized scripts automatically whenever a system is initialized or rebooted.
  • hop - In a packet-switching network, a hop is the trip a data packet takes from one router or intermediate point to another in the network.
  • host virtual machine (host VM) - A host virtual machine is the server component of a virtual machine (VM), the underlying hardware that provides computing resources to support a particular guest virtual machine (guest VM).
  • hosted services - Hosted services are applications, IT infrastructure components or functions that organizations access from external service providers, typically through an internet connection.
  • hot spare - A hot spare, also called a hot standby, is a backup component that can be placed into service immediately when a primary component fails.
  • How do I...choose a VPN for my small business? - A virtual private network (VPN)is a way to use a public telecommunication infrastructure, such as the Internet,to provide remote offices or individual users with secure access to their organization's network.
  • HPE OneView (formerly HP OneView) - HPE OneView, formerly known as HP OneView, is a converged infrastructure management platform that provides a unified interface for the administration of software-defined systems in a data center.
  • hyper-hybrid cloud - A hyper-hybrid cloud is a complex distributed environment involving multiple and diverse interconnected public and private clouds, often from multiple providers.
  • I/O contention (input/output contention) - I/O contention (input/output contention), occurs when virtual machines compete for I/O resources because there is a limited storage bandwidth.
  • Identity of Things (IDoT) - The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.
  • ImageX - ImageX is a command-line tool that allows an administrator to capture an image of an entire hard disk drive and its files and folders in a single Windows Imaging Format (WIM) file.
  • incident - An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.
  • inline deduplication - Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
  • integrated stack - An integrated stack is a vendor product that provides an enterprise information technology (IT) customer with a scalable network, storage and server infrastructure that comes pre-loaded with virtualization, automation and management software.
  • Intel VT (Virtualization Technology) - Intel VT (Virtualization Technology) is the company's hardware assistance for processors running virtualization platforms.
  • intent-based networking (IBN) - Intent-based networking (IBN) is a form of network administration that incorporates artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network.
  • interrupt vector - An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.
  • Iometer - Iometer allows users to set custom input/output profiles to simulate different application workloads for testing.
  • IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
  • IPX (Internetwork Packet Exchange) - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
  • ISSU (in-service software upgrade) - An ISSU (in-service software upgrade) is a technique for updating software on a network device without taking that device offline and thereby disrupting network services.
  • IT as a Service (ITaaS) - IT as a Service (ITaaS) is a technology-delivery method that treats IT (information technology) as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.
  • IT incident report - An IT incident report is documentation of an event that has disrupted the normal operation of some IT system (or that had the potential to do so) and how that situation was handled.
  • IT operations - IT operations is the overarching term for the processes and services administered by an organization's information technology (IT) department.
  • IT operations analytics (ITOA) - IT operations analytics (ITOA) is the practice of monitoring systems and gathering, processing and interpreting data from various operations sources to guide decisions and predict potential issues.
  • IT operations management (ITOM) - IT operations management (ITOM) is the administrative area involving technology infrastructure components and the requirements of individual applications, services, storage, networking and connectivity elements within an organization.
  • LAN-free backup - LAN-free backup is the process of backing up server data to a centralized storage device rather than moving it across a local-area network (LAN).
  • LANDesk Client Manager (LDCM) - LDCM (LANDesk Client Manager) is a software product from Intel that lets a system administrator for a local area network () see the configurations and monitor the status of personal computer on the LAN.
  • latency - Latency is the delay from the input into a system to a desired outcome.
  • local wipe - Local wipe, also known as auto-wipe, is deletion of a device's data which is initiated by software on the device itself, rather than through remote administration.
  • locked down device (LDD) - A locked down device (LDD) is a mobile device, typically a smartphone, that is shipped by a vendor with the ability to accept only the SIM card that originally came with it.
  • log (log file) - A log, in a computing context, is the automatically produced and time-stamped documentation of events relevant to a particular system.
  • log analytics - Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.
  • logical interface (LIF) - A logical interface (LIF) Is a software entity consisting of an IP address that is associated with a number of attributes such as a role, a home port, a firewall policy, a home node, a routing group and a list of ports for failover purposes.
  • logical network - A logical network is one that appears to the user as a single, separate entity although it might in fact be either just a part of a larger network or an entity connecting multiple networks.
  • LUN masking - LUN masking is a further constraint added to zoning, subdividing access to the port so that only LUNs authorized to access a specific server can access the corresponding port.
  • LUN zoning - LUN zoning is a method of configuring SAN fabric to match logical unit numbers (LUNs) to the proper servers.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • managed hosting - Managed hosting is an IT provisioning model in which a service provider leases dedicated servers and associated hardware to a single customer and manages those systems on the customer's behalf.
  • managed network services - Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).
  • management information base (MIB) - A management information base (MIB) is a formal description of a set of network objects that can be managed using the Simple Network Management Protocol (SNMP).
  • MCSE Private Cloud (Microsoft Certified Solutions Expert Private Cloud) - Microsoft Certified Solutions Expert (MCSE) Private Cloud is a new Microsoft certification covering Windows 2012 Hyper-V and System Center 2012, as well as applications such as SharePoint and Exchange.
  • Memcached - Memcached is an open source, distributed memory object caching system that alleviates database load to speed up dynamic Web applications.
  • memory dump - A memory dump is the process of taking all information content in RAM and writing it to a storage drive.
  • memory overcommit (or overcommitment) - Memory overcommit (or overcommitment) is a hypervisor feature that allows a virtual machine (VM) to use more memory space than the physical host has available.
  • Microsoft Azure - Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing platform.
  • Microsoft Exchange Server ActiveSync Web Administration Tool - The Microsoft Exchange Server ActiveSync Web Administration Tool is a software application that provides a network administrator with a Web interface for mobile device management.
  • Microsoft Exchange System Attendant (SA) - Microsoft Exchange System Attendant service is software that proxies Active Directory requests and regulates internal Exchange Server functions.
  • Microsoft Hyper-V Best Practices Analyzer - Microsoft Hyper-V Best Practices Analyzer is a server management tool that scans server configurations and generates a report that identifies best practice violations.
  • Microsoft Hyper-V NIC teaming - Microsoft Hyper-V NIC teaming is the process of grouping multiple virtual network interface cards (NICs) across different physical NICs to increase bandwidth and provide redundancy.
  • Microsoft System Center 2012 - Microsoft System Center 2012 is a bundled suite of systems management products that offers tools to monitor and automate virtualized environments, including private clouds based on Microsoft Hyper-V.
  • Microsoft System Center Orchestrator - Microsoft System Center Orchestrator is a workflow automation software product introduced as part of the Microsoft System Center 2012 suite.
  • Microsoft Windows Performance Monitor - The Microsoft Windows Performance Monitor is a tool that admins can use to examine how programs running on their computers affect their performance.
  • Microsoft Windows PowerShell 4.0 - Microsoft Windows PowerShell 4.
  • MiFi - MiFi is a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network.
  • Mininet - Mininet is a software emulator for prototyping a large network on a single machine.
  • mobile collaboration - Mobile collaboration is the use of mobile devices and collaborative apps to allow geographically dispersed people to work together on endeavors ranging from small personal projects to high-profile enterprise teamwork.
  • mobile IT (mobile information technology) - Mobile IT (mobile information technology) is the ability of IT departments to deliver enterprise information technology solutions to employees working anywhere on any device.
  • mobile workforce management (MWM) - Mobile workforce management (MWM) is a category of software and related services used to manage employees working outside the company premises; the term is often used in reference to field teams.
  • moves, adds and changes (MAC) - Moves, adds and changes (MAC) keep computing equipment in line with user needs and up-to-date, with disciplined process management.
  • MSP platform (managed service provider platform) - A managed service provider (MSP) platform is a computing framework used to deliver network-based services, applications, and equipment to enterprises, residences, or other service providers.
  • municipal broadband - Municipal broadband is high-bandwidth internet access that is funded either in part or completely by municipal government.
  • NBAR (Network Based Application Recognition) - Network Based Application Recognition (NBAR) is a mechanism that classifies and regulates bandwidth for network applications to ensure that available resources are utilized as efficiently as possible.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • What is risk management and why is it important?

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity
  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close