Browse Definitions :

Network management

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

REM - ZER

  • remote desktop - Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote desktop protocol (RDP) - Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server.
  • remote replication - Remote replication is the process of copying production data to a device at a remote location for data protection or disaster recovery purposes.
  • rich client - A rich client is a networked computer that has some resources installed locally but also depends on other resources distributed over the network.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • ring network - A ring network is a local area network (LAN) in which the nodes (workstations or other devices) are connected in a closed loop configuration.
  • rlogin (remote login) - Rlogin (remote login) is a UNIX command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer.
  • RMON (Remote Network Monitoring) - RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site.
  • ROBO backup (remote data backup) - ROBO backup is the process of copying and archiving data created by remote and branch offices (ROBOs) and storing it securely.
  • root partition - A root partition is the isolated area in a Microsoft Hyper-V environment where the hypervisor runs.
  • RSAT (Microsoft Remote Server Administration Tools) - RSAT (Remote Server Administration Tools) is a feature that began in Windows Server 2008 R2 to help admins remotely manage computers running Windows Server.
  • RtOI (real-time operational intelligence) - Real-time operational intelligence (RtOI) is an emerging industrial discipline that allows businesses to intelligently transform vast amounts of operational data into actionable information that is accessible anywhere, anytime and across many devices, including tablets and smartphones.
  • Security as a Service (SaaS) - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • server farm (Web farm, Web server farm) - A server farm is a group of computers acting as servers and housed together in a single location.
  • service desk - A service desk is a communications center that provides a single point of contact (SPOC) between a company and its customers, employees and business partners.
  • service mesh - A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.
  • session border controller (SBC) - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a Voice over Internet Protocol (VoIP) network.
  • shadow IT - Shadow IT is hardware or software that is not supported by an organization's IT department.
  • Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
  • short message service center (SMSC) - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • shrink wrap license - A shrink wrap license is an end user agreement (EULA) that is enclosed with software in plastic-wrapped packaging.
  • Simian Army - The Simian Army is a collection of open source cloud testing tools created by the online video streaming company, Netflix.
  • SIP trunking (Session Initiation Protocol trunking) - Session Initiation Protocol (SIP) trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP (VoIP) connectivity between an on-premises phone system and the public switched telephone network (PSTN).
  • SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
  • Software as a Service (SaaS) - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
  • software package - A software package is an assemblage of files and information about those files.
  • software-defined networking monitoring application (SDN monitoring application) - An SDN monitoring application is a software program that oversees the traffic in a software-defined network (SDN) as a component of network management.
  • source deduplication - Source deduplication is the removal of redundancies from data before transmission to the backup target.
  • Space Communications Protocol Specifications (SCPS) - Space Communications Protocol Specifications (SCPS) are designed to improve communications reliability, error checking, efficiency and performance in ground, manned craft and satellite inter-communications.
  • split brain syndrome - Split brain syndrome, in a clustering context, is a state in which a cluster of nodes gets divided (or partitioned) into smaller clusters of equal numbers of nodes, each of which believes it is the only active cluster.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • SSL checker (secure socket layer checker) - An SSL checker (Secure Sockets Layer checker) is a tool that helps an organization verify proper installation of an SSL certificate on a Web server to ensure it is valid, trusted and will work properly for its users.
  • stack overflow - A stack overflow is an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available.
  • standard operating environment (SOE) - Standard operating environments (SOE) simplify desktop deployment and network administration within an organization.
  • STONITH (Shoot The Other Node In The Head) - STONITH (Shoot The Other Node In The Head) is a Linux service for maintaining the integrity of nodes in a high-availability (HA) cluster.
  • superuser - A superuser is a network account with privilege levels far beyond those of most user accounts.
  • SWAN (state wide area network) - In India, SWAN is a government-subsidized project to create a state wide area network (WAN) that will improve government efficiency.
  • Systems Network Architecture (SNA) - SNA is a proprietary IBM architecture and set of implementing products for network computing within an enterprise.
  • target deduplication - Target deduplication is the removal of redundancies from a backup transmission as it passes through an appliance sitting between the source and the backup target.
  • TCP Wrapper - TCP Wrapper is a public domain computer program that provides firewall services for UNIX servers.
  • Technical Office Protocol (TOP) - Technical Office Protocol (TOP), also called Technical and Office Protocol, is a set of protocols intended for networks that perform distributed information processing in business offices.
  • Testing as a Service (TaaS) - Testing as a Service (TaaS) is an outsourcing model in which testing activities associated with some of an organization’s business activities are performed by a service provider rather than employees.
  • time-division multiplexing (TDM) - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.
  • Top searches of 2008 - What were people searching the WhatIs.
  • traceroute - Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer.
  • transaction monitoring (business transaction management) - Transaction monitoring, also known as business transaction management, is the supervision of critical business applications and services by auditing the individual transactions that flow across the application infrastructure.
  • transparent addressing - On a wide area network (WAN), transparent addressing is a method of network addressing in which all intermediate node addresses are spoofed, so the client and server see each other's addresses and port configurations as if there were no intermediate nodes.
  • treemap - A treemap is a visual method for displaying hierarchical data ; it uses nested rectangles to represent the branches of a tree diagram.
  • troubleshooting - Troubleshooting is a systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
  • Tsunami UDP - Tsunami UDP is an open source file transfer protocol that enables high-speed data transfer over network paths with a large bandwidth delay product.
  • unified computing system (UCS) - A unified computing system (UCS) is is a converged data center architecture that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
  • unified network management - Unified network management is the administration of both wired and wireless networks through a single interface.
  • United Kingdom Climate Change Act - The United Kingdom Climate Change Act is the world's first legally binding environmental sustainability framework.
  • Uptime Institute, Inc. - The Uptime Institute, Inc.
  • Uptime Institute’s data center tier standards - The Uptime Institute’s data center tier standards are a standardized methodology used to determine availability in a facility.
  • user account provisioning - User account provisioning is a business process for creating and managing access to resources in an information technology (IT) system.
  • user installed application (UIA) - User installed applications (UIA) are programs that are installed on a computer by an end user, instead of by a corporate IT department.
  • variable-length subnet mask (VLSM) - Definition: Learn what a variable-length subnet mask (VLSM) is and how it allows network engineers to reduce the number of wasted IP addresses in each subnet.
  • vCPE (virtual customer premises equipment) - Virtual customer premises equipment (also referred to as vCPE or cloud CPE) are enterprise network services delivered through software.
  • virtual address - A virtual address is a binary number in virtual memory that enables a process to use a location in primary storage (also called main memory) independently of other processes, and to use more space than actually exists in primary storage.
  • virtual desktop - A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.
  • virtual LUN or thin LUN - A virtual LUN (virtual logical unit number) is a representation of a storage area that is not tied to any physical storage allocation.
  • virtual machine lifecycle management (VMLM) - Virtual machine lifecycle management is a set of processes designed to help administrators oversee the implementation, delivery, operation, and maintenance of virtual machines (VMs) over the course of their existence.
  • virtual network functions (VNF) - Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.
  • virtual networking - Virtual networking is a technology that facilitates the control of one or more remotely located computers or servers over the Internet.
  • virtual SAN appliance (VSA) - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
  • virtual switch - A virtual switch is a software program that allows one virtual machine (VM) to communicate with another.
  • virtual systems management (VSM) - Virtual systems management (VSM), also known as virtual system management, is the process of remotely managing the allocation and use of resources in conventional networks as well as in virtual area networks (VANs), virtual private networks (VPNs), virtual network computing (VNC) and virtual servers.
  • virtualization sprawl (VM sprawl) - Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where the administrator can no longer manage them effectively.
  • virtualization stack - A virtualization stack is the collection of resources that, along with the hypervisor, make up the Microsoft Hyper-V environment.
  • VMware backup - VMware backup is the copying of data on a virtual machine (VM) in a VMware environment to prevent data loss.
  • VMware Horizon Application Manager - VMware Horizon Application Manager, also known as Horizon App Manager, is an enterprise service for managing access to software.
  • VOIPSA (Voice over IP Security Alliance) - VOIPSA (Voice over IP Security Alliance) is a cross-industry coalition of individuals and organizations from the security and VoIP communications sectors.
  • Vouch by Reference (VBR) - Vouch By Reference (VBR) is a protocol for adding third-party certification to email.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • VxWorks - VxWorks is a real-time operating system (RTOS) that can be used in embedded systems.
  • Wake on LAN - Wake on LAN is a technology that allows a network professional to remotely power on a computer or to wake it up from sleep mode.
  • WAN clustering (geoclustering, high-availability clustering or remote clustering) - WAN clustering, also called geoclustering, high-availability clustering or remote clustering, is the use of multiple redundant computing resources located in different geographical locations to form what appears to be a single highly-available system.
  • WebOps (Web operations) - WebOps, short for Web operations, is the area of IT systems management that deals with the complexities of Web-based applications and the systems that support them.
  • Wide Area Ethernet (WAE) - Wide Area Ethernet (WAE) or Ethernet WAN (also sometimes referred to as fiber or LAN extension service ) is a network carrier service that delivers high-speed wide area network (WAN) connectivity, utilizing Ethernet as the connection method.
  • wildcard certificate - A wildcard certificate is a digital certificate that is applied to a domain and all its subdomains.
  • Windows Deployment Services (WDS) - Windows Deployment Services is a server role that gives admins the ability to deploy Windows operating systems remotely.
  • Windows event log - The Windows event log is a detailed record of system, security and application notifications stored by the Windows operating system that is used by administrators to diagnose system problems and predict future issues.
  • Windows Server Update Services (WSUS) - Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Windows XP, Windows Server 2000, and Windows Server 2003 operating systems.
  • Windows To Go - Windows To Go is a feature of the Windows 8 Enterprise operating system that allows it to be copied to a portable USB storage device.
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN).
  • wireless WAN (Wireless Wide Area Network) - A wireless WAN is a wide area network in which separate areas of coverage or cells are connected wirelessly to provide service to a large geographic area.
  • Wireshark - Wireshark is an open source tool for analyzing packets and profiling network traffic.
  • wiretap Trojan - A wiretap Trojan is a program that surreptitiously records VoIP calls.
  • wsname - WSName, or Workstation Name Changer, is a freeware utility that automates the process of computer renaming.
  • XenMobile Device Manager (XDM) - Citrix's XenMobile Device Manager (XDM) is the mobile device management tools within the XenMobile product suite.
  • YANG (data modeling language) - YANG is a data modeling language for the NETCONF configuration management protocol.
  • Yellowdog Updater, Modified (YUM) - Yellowdog Update, Modified (YUM) is a program that manages installation, updates and removal for Red Hat package manager (RPM) systems.
  • Zabbix - Zabbix is an open source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services.
  • Zero Administration - Zero Administration for Windows is Microsoft's initiative to help make its operating system easier to install and manage.
  • zero client - Zero client, also known as ultrathin client, is a server-based computing model in which the end user has no local software and very little hardware.
  • zero touch provisioning (ZTP) - Zero touch provisioning (ZTP) is a switch feature that allows the devices to be provisioned and configured automatically, eliminating most of the manual labor involved with adding them to a network.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close