Browse Definitions :

Network management

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

RTO - ZER

  • RtOI (real-time operational intelligence) - Real-time operational intelligence (RtOI) is an emerging industrial discipline that allows businesses to intelligently transform vast amounts of operational data into actionable information that is accessible anywhere, anytime and across many devices, including tablets and smartphones.
  • Secure Access Service Edge (SASE) - Secure Access Service Edge, also known as SASE -- pronounced 'sassy' -- is a cloud architecture that bundles network and security solutions together and delivers them as a unified cloud service.
  • Security as a Service (SaaS) - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • server farm (Web farm, Web server farm) - A server farm is a group of computers acting as servers and housed together in a single location.
  • service desk - A service desk is a communications center that provides a single point of contact (SPOC) between a company and its customers, employees and business partners.
  • service mesh - A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.
  • session border controller (SBC) - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a Voice over Internet Protocol (VoIP) network.
  • shadow IT - Shadow IT is hardware or software that is not supported by an organization's IT department.
  • Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
  • short message service center (SMSC) - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • shrink wrap license - A shrink wrap license is an end user agreement (EULA) that is enclosed with software in plastic-wrapped packaging.
  • Simian Army - The Simian Army is a collection of open source cloud testing tools created by the online video streaming company, Netflix.
  • SIP trunking (Session Initiation Protocol trunking) - Session Initiation Protocol (SIP) trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP (VoIP) connectivity between an on-premises phone system and the public switched telephone network (PSTN).
  • SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
  • Software as a Service (SaaS) - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
  • software package - A software package is an assemblage of files and information about those files.
  • software-defined networking monitoring application (SDN monitoring application) - An SDN monitoring application is a software program that oversees the traffic in a software-defined network (SDN) as a component of network management.
  • source deduplication - Source deduplication is the removal of redundancies from data before transmission to the backup target.
  • Space Communications Protocol Specifications (SCPS) - Space Communications Protocol Specifications (SCPS) are designed to improve communications reliability, error checking, efficiency and performance in ground, manned craft and satellite inter-communications.
  • split brain syndrome - Split brain syndrome, in a clustering context, is a state in which a cluster of nodes gets divided (or partitioned) into smaller clusters of equal numbers of nodes, each of which believes it is the only active cluster.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • SSL checker (secure socket layer checker) - An SSL checker (Secure Sockets Layer checker) is a tool that helps an organization verify proper installation of an SSL certificate on a Web server to ensure it is valid, trusted and will work properly for its users.
  • stack overflow - A stack overflow is an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available.
  • standard operating environment (SOE) - Standard operating environments (SOE) simplify desktop deployment and network administration within an organization.
  • STONITH (Shoot The Other Node In The Head) - STONITH (Shoot The Other Node In The Head) is a Linux service for maintaining the integrity of nodes in a high-availability (HA) cluster.
  • superuser - A superuser is a network account with privilege levels far beyond those of most user accounts.
  • SWAN (state wide area network) - In India, SWAN is a government-subsidized project to create a state wide area network (WAN) that will improve government efficiency.
  • Systems Network Architecture (SNA) - SNA is a proprietary IBM architecture and set of implementing products for network computing within an enterprise.
  • target deduplication - Target deduplication is the removal of redundancies from a backup transmission as it passes through an appliance sitting between the source and the backup target.
  • TCP Wrapper - TCP Wrapper is a public domain computer program that provides firewall services for UNIX servers.
  • Technical Office Protocol (TOP) - Technical Office Protocol (TOP), also called Technical and Office Protocol, is a set of protocols intended for networks that perform distributed information processing in business offices.
  • testing as a service (TaaS) - Testing as a service (TaaS) is an outsourcing model in which testing activities associated with some of an organization's business activities are performed by a service provider rather than in-house employees.
  • time-division multiplexing (TDM) - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.
  • traceroute - Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer.
  • transaction monitoring (business transaction management) - Transaction monitoring, also known as business transaction management, is the supervision of critical business applications and services by auditing the individual transactions that flow across the application infrastructure.
  • transparent addressing - On a wide area network (WAN), transparent addressing is a method of network addressing in which all intermediate node addresses are spoofed, so the client and server see each other's addresses and port configurations as if there were no intermediate nodes.
  • treemap - A treemap is a visual method for displaying hierarchical data ; it uses nested rectangles to represent the branches of a tree diagram.
  • troubleshooting - Troubleshooting is a systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
  • Tsunami UDP - Tsunami UDP is an open source file transfer protocol that enables high-speed data transfer over network paths with a large bandwidth delay product.
  • unified computing system (UCS) - A unified computing system (UCS) is is a converged data center architecture that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
  • unified network management - Unified network management is the administration of both wired and wireless networks through a single interface.
  • United Kingdom Climate Change Act - The United Kingdom Climate Change Act is the world's first legally binding environmental sustainability framework.
  • Uptime Institute, Inc. - The Uptime Institute, Inc.
  • Uptime Institute’s data center tier standards - The Uptime Institute’s data center tier standards are a standardized methodology used to determine availability in a facility.
  • user account provisioning - User account provisioning is a business process for creating and managing access to resources in an information technology (IT) system.
  • user installed application (UIA) - User installed applications (UIA) are programs that are installed on a computer by an end user, instead of by a corporate IT department.
  • variable-length subnet mask (VLSM) - Definition: Learn what a variable-length subnet mask (VLSM) is and how it allows network engineers to reduce the number of wasted IP addresses in each subnet.
  • vCPE (virtual customer premises equipment) - Virtual customer premises equipment (also referred to as vCPE or cloud CPE) are enterprise network services delivered through software.
  • virtual address - A virtual address is a binary number in virtual memory that enables a process to use a location in primary storage (also called main memory) independently of other processes, and to use more space than actually exists in primary storage.
  • virtual desktop - A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.
  • virtual LUN or thin LUN - A virtual LUN (virtual logical unit number) is a representation of a storage area that is not tied to any physical storage allocation.
  • virtual machine lifecycle management (VMLM) - Virtual machine lifecycle management is a set of processes designed to help administrators oversee the implementation, delivery, operation, and maintenance of virtual machines (VMs) over the course of their existence.
  • virtual network functions (VNF) - Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.
  • virtual networking - Virtual networking is a technology that facilitates the control of one or more remotely located computers or servers over the Internet.
  • virtual SAN appliance (VSA) - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
  • virtual switch - A virtual switch is a software program that allows one virtual machine (VM) to communicate with another.
  • virtual systems management (VSM) - Virtual systems management (VSM), also known as virtual system management, is the process of remotely managing the allocation and use of resources in conventional networks as well as in virtual area networks (VANs), virtual private networks (VPNs), virtual network computing (VNC) and virtual servers.
  • virtualization sprawl (VM sprawl) - Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where the administrator can no longer manage them effectively.
  • virtualization stack - A virtualization stack is the collection of resources that, along with the hypervisor, make up the Microsoft Hyper-V environment.
  • VMware backup - VMware backup is the copying of data on a virtual machine (VM) in a VMware environment to prevent data loss.
  • VMware Horizon Application Manager - VMware Horizon Application Manager, also known as Horizon App Manager, is an enterprise service for managing access to software.
  • Vouch by Reference (VBR) - Vouch By Reference (VBR) is a protocol for adding third-party certification to email.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • VxWorks - VxWorks is a real-time operating system (RTOS) that can be used in embedded systems.
  • Wake on LAN - Wake on LAN is a technology that allows a network professional to remotely power on a computer or to wake it up from sleep mode.
  • WAN clustering (geoclustering, high-availability clustering or remote clustering) - WAN clustering, also called geoclustering, high-availability clustering or remote clustering, is the use of multiple redundant computing resources located in different geographical locations to form what appears to be a single highly-available system.
  • WebOps (Web operations) - WebOps, short for Web operations, is the area of IT systems management that deals with the complexities of Web-based applications and the systems that support them.
  • Wide Area Ethernet (WAE) - Wide Area Ethernet (WAE) or Ethernet WAN (also sometimes referred to as fiber or LAN extension service ) is a network carrier service that delivers high-speed wide area network (WAN) connectivity, utilizing Ethernet as the connection method.
  • wildcard certificate - A wildcard certificate is a digital certificate that is applied to a domain and all its subdomains.
  • Windows Deployment Services (WDS) - Windows Deployment Services is a server role that gives admins the ability to deploy Windows operating systems remotely.
  • Windows event log - The Windows event log is a detailed record of system, security and application notifications stored by the Windows operating system that is used by administrators to diagnose system problems and predict future issues.
  • Windows Server Update Services (WSUS) - Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Windows XP, Windows Server 2000, and Windows Server 2003 operating systems.
  • Windows To Go - Windows To Go is a feature of the Windows 8 Enterprise operating system that allows it to be copied to a portable USB storage device.
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN).
  • wireless WAN (Wireless Wide Area Network) - A wireless WAN is a wide area network in which separate areas of coverage or cells are connected wirelessly to provide service to a large geographic area.
  • Wireshark - Wireshark is an open source tool for analyzing packets and profiling network traffic.
  • wsname - WSName, or Workstation Name Changer, is a freeware utility that automates the process of computer renaming.
  • XenMobile Device Manager (XDM) - Citrix's XenMobile Device Manager (XDM) is the mobile device management tools within the XenMobile product suite.
  • YANG (data modeling language) - YANG is a data modeling language for the NETCONF configuration management protocol.
  • Yellowdog Updater, Modified (YUM) - Yellowdog Update, Modified (YUM) is a program that manages installation, updates and removal for Red Hat package manager (RPM) systems.
  • Zabbix - Zabbix is an open source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services.
  • Zero Administration - Zero Administration for Windows is Microsoft's initiative to help make its operating system easier to install and manage.
  • zero client - Zero client, also known as ultrathin client, is a server-based computing model in which the end user's computing device has no local storage.
  • zero touch provisioning (ZTP) - Zero touch provisioning (ZTP) is a switch feature that allows the devices to be provisioned and configured automatically, eliminating most of the manual labor involved with adding them to a network.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close