Browse Definitions :

Network Mgmt

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

UNI - ZER

  • unified computing system (UCS) - A unified computing system (UCS) is is a converged data center architecture that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
  • unified network management - Unified network management is the administration of both wired and wireless networks through a single interface.
  • Uptime Institute, Inc. - The Uptime Institute, Inc.
  • Uptime Institute’s data center tier standards - The Uptime Institute’s data center tier standards are a standardized methodology used to determine availability in a facility.
  • user account provisioning - User account provisioning is a business process for creating and managing access to resources in an information technology (IT) system.
  • user installed application (UIA) - User installed applications (UIA) are programs that are installed on a computer by an end user, instead of by a corporate IT department.
  • Variable Length Subnet Mask (VLSM) - Variable Length Subnet Mask (VLSM) is a subnet -- a segmented piece of a larger network -- design strategy where all subnet masks can have varying sizes.
  • vCPE (virtual customer premises equipment) - Virtual customer premises equipment (also referred to as vCPE or cloud CPE) are enterprise network services delivered through software.
  • virtual address - A virtual address is a binary number in virtual memory that enables a process to use a location in primary storage (also called main memory) independently of other processes, and to use more space than actually exists in primary storage.
  • virtual desktop - A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.
  • virtual LUN or thin LUN - A virtual LUN (virtual logical unit number) is a representation of a storage area that is not tied to any physical storage allocation.
  • virtual machine lifecycle management (VMLM) - Virtual machine lifecycle management is a set of processes designed to help administrators oversee the implementation, delivery, operation, and maintenance of virtual machines (VMs) over the course of their existence.
  • virtual network functions (VNF) - Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.
  • virtual networking - Virtual networking is a technology that facilitates the control of one or more remotely located computers or servers over the Internet.
  • virtual SAN appliance (VSA) - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
  • virtual switch - A virtual switch is a software program that allows one virtual machine (VM) to communicate with another.
  • virtualization sprawl (VM sprawl) - Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where administrators can no longer manage them effectively.
  • virtualization stack - A virtualization stack is the collection of resources that, along with the hypervisor, make up the Microsoft Hyper-V environment.
  • VMware backup - VMware backup is the copying of data on a virtual machine (VM) in a VMware environment to prevent data loss.
  • VMware Horizon Application Manager - VMware Horizon Application Manager, also known as Horizon App Manager, is an enterprise service for managing access to software.
  • Vouch by Reference (VBR) - Vouch By Reference (VBR) is a protocol for adding third-party certification to email.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • Wake on LAN - Wake on LAN is a technology that allows a network professional to remotely power on a computer or to wake it up from sleep mode.
  • WebOps (Web operations) - WebOps, short for Web operations, is the area of IT systems management that deals with the complexities of Web-based applications and the systems that support them.
  • What is a private cloud? - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • What is configuration management? A comprehensive guide - Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
  • What is IT/OT convergence? Everything you need to know - IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.
  • What is Testing as a Service (TaaS)? - Testing as a service (TaaS) is an outsourcing model in which testing activities associated with some of an organization's business activities are performed by a service provider rather than in-house employees.
  • wildcard certificate - A wildcard certificate is a digital certificate that is applied to a domain and all its subdomains.
  • Windows Deployment Services (WDS) - Windows Deployment Services is a server role that gives admins the ability to deploy Windows operating systems remotely.
  • Windows event log - The Windows event log is a detailed record of system, security and application notifications stored by the Windows operating system that is used by administrators to diagnose system problems and predict future issues.
  • Windows Server Update Services (WSUS) - Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Windows XP, Windows Server 2000, and Windows Server 2003 operating systems.
  • Windows To Go - Windows To Go is a feature of the Windows 8 Enterprise operating system that allows it to be copied to a portable USB storage device.
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN).
  • Wireshark - Wireshark is an open source tool for analyzing packets and profiling network traffic.
  • wsname - WSName, or Workstation Name Changer, is a freeware utility that automates the process of computer renaming.
  • XenMobile Device Manager (XDM) - Citrix's XenMobile Device Manager (XDM) is the mobile device management tools within the XenMobile product suite.
  • YANG (data modeling language) - YANG is a data modeling language for the NETCONF configuration management protocol.
  • Yellowdog Updater, Modified (YUM) - Yellowdog Update, Modified (YUM) is a program that manages installation, updates and removal for Red Hat package manager (RPM) systems.
  • Zabbix - Zabbix is an open source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services.
  • zero client - Zero client, also known as ultrathin client, is a server-based computing model in which the end user's computing device has no local storage.
  • zero-touch provisioning (ZTP) - Zero-touch provisioning (ZTP) is a method of setting up devices that automatically configures the device using a switch feature.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • What is risk management and why is it important?

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity
  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close