Browse Definitions :

Network management

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

LOG - REL

  • log (log file) - A log, in a computing context, is the automatically produced and time-stamped documentation of events relevant to a particular system.
  • log analytics - Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.
  • logical interface (LIF) - A logical interface (LIF) Is a software entity consisting of an IP address that is associated with a number of attributes such as a role, a home port, a firewall policy, a home node, a routing group and a list of ports for failover purposes.
  • logical network - A logical network is one that appears to the user as a single, separate entity although it might in fact be either just a part of a larger network or an entity connecting multiple networks.
  • LUN masking - LUN masking is a further constraint added to zoning, subdividing access to the port so that only LUNs authorized to access a specific server can access the corresponding port.
  • LUN zoning - LUN zoning is a method of configuring SAN fabric to match logical unit numbers (LUNs) to the proper servers.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • managed hosting - Managed hosting is an IT provisioning model in which a service provider leases dedicated servers and associated hardware to a single customer and manages those systems on the customer's behalf.
  • managed network services - Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).
  • managed security services (MSS) - Managed security services (MSS) is a systematic approach to managing an organization's security needs.
  • management information base (MIB) - A management information base (MIB) is a formal description of a set of network objects that can be managed using the Simple Network Management Protocol (SNMP).
  • MCSE Private Cloud (Microsoft Certified Solutions Expert Private Cloud) - Microsoft Certified Solutions Expert (MCSE) Private Cloud is a new Microsoft certification covering Windows 2012 Hyper-V and System Center 2012, as well as applications such as SharePoint and Exchange.
  • Memcached - Memcached is an open source, distributed memory object caching system that alleviates database load to speed up dynamic Web applications.
  • memory dump - A memory dump is the process of taking all information content in RAM and writing it to a storage drive.
  • memory overcommit (or overcommitment) - Memory overcommit (or overcommitment) is a hypervisor feature that allows a virtual machine (VM) to use more memory space than the physical host has available.
  • Microsoft Azure (Windows Azure) - Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing platform.
  • Microsoft Exchange Server ActiveSync Web Administration Tool - The Microsoft Exchange Server ActiveSync Web Administration Tool is a software application that provides a network administrator with a Web interface for mobile device management.
  • Microsoft Exchange System Attendant (SA) - Microsoft Exchange System Attendant service is software that proxies Active Directory requests and regulates internal Exchange Server functions.
  • Microsoft Hyper-V Best Practices Analyzer - Microsoft Hyper-V Best Practices Analyzer is a server management tool that scans server configurations and generates a report that identifies best practice violations.
  • Microsoft Hyper-V NIC teaming - Microsoft Hyper-V NIC teaming is the process of grouping multiple virtual network interface cards (NICs) across different physical NICs to increase bandwidth and provide redundancy.
  • Microsoft System Center 2012 - Microsoft System Center 2012 is a bundled suite of systems management products that offers tools to monitor and automate virtualized environments, including private clouds based on Microsoft Hyper-V.
  • Microsoft System Center Orchestrator - Microsoft System Center Orchestrator is a workflow automation software product introduced as part of the Microsoft System Center 2012 suite.
  • Microsoft Windows Performance Monitor - The Microsoft Windows Performance Monitor is a tool that admins can use to examine how programs running on their computers affect their performance.
  • Microsoft Windows PowerShell 4.0 - Microsoft Windows PowerShell 4.
  • MiFi - MiFi is a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network.
  • Mininet - Mininet is a software emulator for prototyping a large network on a single machine.
  • mobile collaboration - Mobile collaboration is the use of mobile devices and collaborative apps to allow geographically dispersed people to work together on endeavors ranging from small personal projects to high-profile enterprise teamwork.
  • mobile IT (mobile information technology) - Mobile IT (mobile information technology) is the ability of IT departments to deliver enterprise information technology solutions to employees working anywhere on any device.
  • mobile VPN (mobile virtual private network) - A mobile VPN is a networking configuration that enables mobile devices such as notebook computers or personal digital assistants (PDAs) to access a virtual private network (VPN) or an intranet while moving from one place to another.
  • mobile workforce management (MWM) - Mobile workforce management (MWM) is a category of software and related services used to manage employees working outside the company premises; the term is often used in reference to field teams.
  • MOSPF (Multicast Open Shortest Path First) - MOSPF (Multicast Open Shortest Path First) is an extension to the OSPF (Open Shortest Path First) protocol that facilitates interoperation between unicast and multicast routers.
  • moves, adds and changes (MAC) - Moves, adds and changes (MAC) keep computing equipment in line with user needs and up-to-date, with disciplined process management.
  • MSP platform (managed service provider platform) - A managed service provider (MSP) platform is a computing framework used to deliver network-based services, applications, and equipment to enterprises, residences, or other service providers.
  • municipal broadband - Municipal broadband is high-bandwidth internet access that is funded either in part or completely by municipal government.
  • NBAR (Network Based Application Recognition) - Network Based Application Recognition (NBAR) is a mechanism that classifies and regulates bandwidth for network applications to ensure that available resources are utilized as efficiently as possible.
  • Net-SNMP (Net Simple Network Management Protocol) - Net-SNMP is a set of tools and libraries for implementing the Simple Network Management Protocol (SNMP) on enterprise networks.
  • NetApp Insight - NetApp Insight is an annual technical conference series for NetApp, a computer storage and data management company.
  • NETCONF - NETCONF is an IETF network management protocol that provides an administrator or network engineer with a secure way to configure a firewall, router, switch or other network device.
  • NetOps - NetOps, also referred to as NetOps 2.
  • netstat - Netstat is a common command line TCP/IP networking utility available in most versions of Windows, Linux, UNIX and other operating systems.
  • network analytics - Network analytics is the application of big data principles and tools to the management and security of data networks.
  • Network as a Service (NaaS) - Network as a service (NaaS) is a business model for delivering enterprise-wide area network services virtually on a subscription basis.
  • network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
  • network coding - Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages.
  • network disaster recovery plan - A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or manmade catastrophe.
  • network engineer - A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.
  • network fabric - Network fabric is an industry term that describes a network topology in which devices pass data to each other through interconnecting switches.
  • network functions virtualization (NFV) - Network functions virtualization (NFV) is an initiative to virtualize network services traditionally run on proprietary, dedicated hardware.
  • network intrusion protection system (NIPS) - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • Network layer - Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the network layer's primary function is to move data into and through other networks.
  • network management system - A network management system (NMS) is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.
  • network virtualization - Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between virtual machines (VMs).
  • Nexus 1000V (Cisco Nexus 1000V) - The Cisco Nexus 1000V is a Cisco Nexus Operating System (NX-OS) switch rendered fully in software for multi-tenant services composed of both physical and virtual networking resources.
  • NFV MANO (network functions virtualization management and orchestration) - NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.
  • NFVi (network functions virtualization infrastructure) - NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.
  • Nginx - Nginx (pronounced engine x) is open source webserver software that also performs reverse proxy, load balancing, email proxy and HTTP cache services.
  • NIS (Network Information System) - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • Novell Directory Services (NDS) - Novell Directory Services (NDS) is a popular software product for managing access to computer resources and keeping track of the users of a network, such as a company's intranet, from a single point of administration.
  • Novell Filr - lNovell Filr is a VMware virtual appliance that uses an organization's existing infrastructure and security controls to provide end users with an online file-sharing service.
  • NWay - NWay is a telecommunications protocol used with Ethernet networking devices (such as router and switch) to automatically negotiate the highest possible common transmission speed between two devices.
  • NX-OS - NX-OS evolved from the Cisco MDS operating system, SAN-OS.
  • ODIN (Open Data Center with an Interoperable Network) - ODIN (Open Data Center with an Interoperable Network) is a reference architecture that describes best practices for creating a flat, converged, virtualized data center fabric based on open industry standards.
  • Open Blueprint - Open Blueprint is IBM's strategic view of the network computing services and the relationship between these services.
  • Open Grid Services Architecture (OGSA) - The Open Grid Services Architecture (OGSA) is a set of standards defining the way in which information is shared among diverse components of large, heterogeneous grid systems.
  • OpenDNS - OpenDNS is the world’s largest reverse DNS service provider.
  • OpenVPN (open source virtual private network) - OpenVPN is an open source virtual private network (VPN) product that offers simplified security, a modular network design and cross-platform portability.
  • operational costs - Definition - In information technology, operational costs document the price of running of IT services on a day-to-day basis.
  • operational level agreement (OLA) - An operational level agreement (OLA) is a contract that defines how various IT groups within a company plan to deliver a service or set of services.
  • operational technology (OT) - Operational technology (OT) is a category of hardware and software that monitors and controls how physical devices perform.
  • OpLock (opportunistic lock) - OpLocks are made to enable simultaneous file access by multiple users while also improving performance for synchronized caches.
  • OTA update (over-the-air update) - An over-the-air update is the wireless delivery of new software or data to mobile devices.
  • P4P (proactive provider participation for P2P) - P4P (proactive provider participation for P2P) is a protocol designed to improve the use of available bandwidth in a P2P network by reducing the overall volume of traffic.
  • package manager or package management system (PMS) - A package manager, also known as a package management system (PMS), is a program used to install, uninstall and manage software packages.
  • packet coalescing - In network adapters using Network Driver Interface Specification (NDIS) versions 6.
  • Packet Order Correction (POC) - Packet Order Correction (POC) is a technique for dealing with out-of-order packet delivery.
  • parent partition - A parent partition is a logical hard drive division in the Microsoft Hyper-V environment that's responsible for running the hypervisor layer and creating and managing child partitions.
  • Path Computation Element Protocol (PCEP) - Path Computation Element (PCE) is a network component, application or node that can apply computational constraints and compute a network path or route by applying computational constraints in real time.
  • Peltier effect - The Peltier effect is a temperature difference created by applying a voltage between two electrodes connected to a sample of semiconductor material.
  • performance testing - Performance testing is the process of determining the speed, responsiveness and stability of a computer, network, software program or device under a workload.
  • phase-change cooling (vapor cooling) - Phase-change cooling, also called vapor cooling, is a microprocessor-cooling technology that works according to the same principles as a conventional refrigerator, freezer or air conditioner.
  • Platform as a Service (PaaS) - Platform as a service (PaaS) is a cloud computing model in which a third-party provider delivers hardware and software tools -- usually those needed for application development -- to users over the internet.
  • Policy and Charging Rules Function (PCRF) - Policy and Charging Rules Function (PCRF) is the part of the Evolved Packet Core (EPC) that supports service data flow detection, policy enforcement and flow-based charging.
  • policy engine - A policy engine is a software component that allows an organization to create, monitor and enforce rules about how network resources and the organization's data can be accessed.
  • Port Address Translation (PAT) - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.
  • port interface card (PIC) - A port interface card (PIC) is a computer circuit board that provides multiple, diverse interfaces for connections to external networks.
  • power usage effectiveness (PUE) - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.
  • private certificate authority (CA) - Private CA stands for private certificate authority and is an enterprise specific certificate authority that functions like a publicly trusted CA but is exclusively run by or for the enterprise.
  • private cloud (internal cloud or corporate cloud) - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • private cloud appliance - A private cloud appliance is a hardware device that provides software-defined converged infrastructure functions for an organization’s proprietary network.
  • private IP address - A private IP address is a non-Internet facing IP address on an internal network.
  • privilege bracketing - Privilege bracketing is the practice of limiting temporarily increased permission levels to the briefest possible time period.
  • privileged identity management (PIM) - Privileged identity management (PIM) is the monitoring and protection of superuser accounts in an organization’s IT environments.
  • problem - A problem, in an IT service management (ITSM) context, is an issue that could cause an incident.
  • programmable logic controller (PLC) - A programmable logic controller (PLC) is a small, modular solid state computer with customized instructions for performing a particular task.
  • proxy hacking - Proxy hacking, also known as proxy hijacking, is an attack technique designed to supplant an authentic Web page in a search engine's index and search results pages.
  • RAT (remote access Trojan) - A remote access Trojan (RAT) is a malware program that gives an intruder administrative control over a target computer.
  • real-time application (RTA) - A real-time application (RTA) is an application program that functions within a time frame that the user senses as immediate or current.
  • real-time location system (RTLS) - A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.
  • Receive Segment Coalescing (RSC) - Receive Segment Coalescing (RSC) is an offload technology in Windows Server 2012 and Windows Server 2012 R2 that can help reduce how much of the CPU is used in network processing.
  • Reliability, Availability and Serviceability (RAS) - Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be considered when designing, manufacturing, purchasing or using a computer product or component.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close