Browse Definitions :

Storage management

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

FIB - NVM

  • Fibre Channel adapter - A Fibre Channel (FC) adapter is a hardware component that provides connectivity from a server to a storage area network (SAN).
  • Fibre Channel director (FC director) - A Fibre Channel (FC) director is a modular, chassis-based, high port-count switch that connects servers, switches and storage in a dedicated FC storage area network (SAN).
  • Fibre Channel Industry Association (FCIA) - The Fibre Channel Industry Association (FCIA) is an international organization whose goal is to help its members promote Fibre Channel (FC) technology.
  • Fibre Channel port names - Fibre Channel port names.
  • Fibre Channel switch (FC switch) - A Fibre Channel switch is a networking device that is compatible with the Fibre Channel (FC) protocol and designed for use in a dedicated storage area network (SAN).
  • file virtualization - File virtualization is the creation of an abstraction layer between file servers and the clients that access those file servers.
  • fixed data (permanent data, reference data, archival data, or fixed-content data) - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • FLAPE - FLAPE (flash plus tape) is an approach to tiered storage that allows administrators to archive data as soon as it is written.
  • flat address space - 1. A flat address space is a set of addresses arranged on a single level.
  • floating gate transistor (FGT) - A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical charge in a memory device that is used to store data.
  • Freedom of Information Act 2000 - The Freedom of Information Act 2000 is an act of the United Kingdom (UK) Parliament defining the ways in which the public may obtain access to government-held information.
  • geo-replication - Geo-replication is a type of data storage replication in which the same data is stored on servers in multiple geographic locations.
  • giant magnetoresistive effect - GMR is the newest generation of hard disk drive storage.
  • gigabyte - A gigabyte -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion bytes.
  • global namespace - Global namespace is a feature that provides a consolidated view into multiple Network File Systems (NFS), Common Internet File Systems (CIFS), network-attached storage (NAS) systems or file servers that are in different physical locations.
  • GlusterFS (Gluster File System) - GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store multiple petabytes of data.
  • Google Cloud Storage - Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.
  • Google Cloud Storage Coldline - Google Cloud Storage Coldline is a public cloud cold storage service from Google intended for archiving and disaster recovery.
  • green networking - Green networking is the practice of selecting energy-efficient networking technologies and products, and minimizing resource use whenever possible.
  • HA storage (high-availability storage) - High-availability storage (HA storage) is a storage system that is continuously operational or provides at least 99% uptime.
  • hardware RAID (hardware redundant array of independent disk) - Hardware RAID is a form of RAID where processing is done externally.
  • HDD form factor (hard disk drive form factor) - HDD form factor is the size or geometry of a hard disk drive, determining the device’s compatibility with the drive bays in a storage array or enclosure, server, portable computer or other computing device.
  • helium hard drive - A helium drive is a hard disk that exploits the characteristic lightness of that gas to increase the medium’s potential speed and storage density.
  • hierarchy - A hierarchy is an organizational structure in which items are ranked according to levels of importance.
  • high availability cluster (HA cluster) - A high availability cluster is a group of hosts that act like a single system and provide continuous uptime.
  • holographic disk drive - A holographic disk drive is a holographic storage device that uses a laser to store data to optical media in three dimensions, maximizing storage capacity by using the media's depth.
  • host-based replication - Host-based replication is the processes of using servers to copy data from one site to another.
  • hot data - Hot data is a reference to data that is accessed the most by an organization.
  • How many bytes for... - This page provides tables and other information about how many bytes are required (how much computer storage) for various information objects or purposes; it also summarizes some facts that have been gathered about how much information exists in the world and, where appropriate, how much computer storage this requires.
  • hybrid cloud hosting - Hybrid cloud hosting allows organizations to provision dedicated servers and storage and cloud servers and storage on the same network.
  • Hybrid Cloud Storage - Hybrid cloud storage is an approach to managing storage that uses both local and off-site resources.
  • hyper-converged storage - Hyper-converged storage is a technology that combines storage, compute, networking and virtualization technologies in one physical unit that is managed as a single system.
  • hyperscale storage - Hyperscale storage is the storage of vast quantities of information in media capable of increasing in size rapidly, efficiently, and indefinitely.
  • hypervisor-aware storage - Hypervisor-aware storage, also called virtualization-aware or VM-aware storage, is a category of storage array that provides administrators with the ability to correlate an application on a virtual machine (VM) with the underlying physical storage.
  • I/O blender effect - The I/O blender effect is a phenomenon in virtualized environments that degrades storage performance.
  • I/O contention (input/output contention) - I/O contention (input/output contention), occurs when virtual machines compete for I/O resources because there is a limited storage bandwidth.
  • I/O virtualization (IOV) - I/O virtualization (IOV), or input/output virtualization, is technology that uses software to abstract upper-layer protocols from physical connections or physical transports.
  • IBM General Parallel File System (IBM GPFS) - The IBM General Parallel File System is one of the top file systems used in high-performance computing and the basis for many storage products used in supercomputing.
  • IBM Spectrum - IBM ships six storage and management software products that fall under the IBM Spectrum umbrella.
  • inline deduplication - Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
  • integer overflow - Integer overflow is the result of trying to place into computer memory an integer (whole number) that is too large for the integer data type in a given system.
  • interrupt vector - An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.
  • Iometer - Iometer allows users to set custom input/output profiles to simulate different application workloads for testing.
  • IP SAN (Internet Protocol storage area network) - An IP SAN is a dedicated storage area network (SAN) that allows multiple servers to access pools of shared block storage devices using storage protocols that depend on the Internet Engineering Taskforce standard Internet Protocol suite.
  • iSCSI target (Internet Small Computer System Interface target) - ISCSI target is a storage option in an Internet Small Computer System Interface server that manages connections between servers that need access to the targets and the iSCSI storage subsystem in a storage area network.
  • IT chargeback system - An IT chargeback system is an accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
  • IT operations - IT operations are the processes and services administered by an organization’s information technology (IT) department.
  • IT operations management (ITOM) - IT operations management (ITOM) is the administrative area involving technology infrastructure components and the requirements of individual applications, services, storage, networking and connectivity elements within an organization.
  • ITIL v3 - ITIL v3 is the third version of the Information Technology Infrastructure Library, a globally recognized collection of best practices for managing information technology (IT).
  • Kibi, mebi, gibi, tebi, pebi, and all that - Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC) in an effort to eliminate the confusion that sometimes occurs between decimal (power-of-10) and binary (power-of-2) numeration terms.
  • Kilo, mega, giga, tera, peta, exa, zetta and all that - Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte or bit in computing and telecommunications.
  • Kryder's Law - Kryder's Law describes the rate at which former Seagate CTO Mark Kryder predicted disk drive density would grow.
  • legacy storage - Legacy storage is traditional storage hardware that is older and sometimes no longer sold by its vendor.
  • Load DynamiX - Load DynamiX is a storage performance testing appliance that can simulate production workloads and virtual desktop infrastructure workloads to determine how a system handles stress before putting that system into production.
  • logical block addressing (LBA) - Logical block addressing is a technique that allows a computer to address a hard disk larger than 528 megabytes.
  • logical interface (LIF) - A logical interface (LIF) Is a software entity consisting of an IP address that is associated with a number of attributes such as a role, a home port, a firewall policy, a home node, a routing group and a list of ports for failover purposes.
  • logical volume management (LVM) - Logical volume management (LVM), a form of storage virtualization, offers system administrators a more flexible approach to managing disk storage space than traditional partitioning.
  • LTFS (Linear Tape File System) - LTFS (Linear Tape File System) is a file system specification that allows Linear Tape-Open (LTO) storage technology to be indexed.
  • LTO-1 (Linear Tape-Open 1) - LTO-1 is the first tape format from the Linear Tape-Open Consortium.
  • LTO-10 (Linear Tape-Open 10) - LTO-10 is an unreleased tape format from the Linear Tape-Open Consortium.
  • LTO-2 (Linear Tape-Open 2) - LTO-2 is the second tape format from the Linear Tape-Open (LTO) Consortium.
  • LTO-3 (Linear Tape-Open 3) - LTO-3 is a tape format from the Linear Tape-Open Consortium first released in 2005 that has since been followed by LTO-4, LTO-5 and LTO-6.
  • LTO-4 (Linear Tape-Open 4) - LTO-4 is a tape format from the Linear Tape-Open Consortium that has been succeeded by LTO-5 and the current LTO-6 version.
  • LTO-5 - LTO-5 is a tape format released in 2010 by the Linear Tape-Open Consortium.
  • LTO-6 (Linear Tape-Open 6) - LTO-6 is the current tape format from the Linear Tape-Open Consortium first released in 2012 that will eventually be succeeded by LTO-7, LTO-8, LTO-9 and LTO-10.
  • LTO-7 (Linear Tape-Open 7) - LTO-7 is a tape format from the Linear Tape-Open (LTO) Consortium released in late 2015.
  • LTO-8 (Linear Tape-Open 8) - LTO-8 is a tape format from the Linear Tape-Open Consortium released in late 2017.
  • LTO-9 (Linear Tape-Open 9) - LTO-9 (Linear Tape-Open 9) is a future tape format from the Linear Tape-Open Consortium.
  • LUN management - LUN management is the process of assigning, provisioning and overseeing logical unit numbers (LUNs) across a storage environment.
  • LUN masking - LUN masking is a further constraint added to zoning, subdividing access to the port so that only LUNs authorized to access a specific server can access the corresponding port.
  • LUN zoning - LUN zoning is a method of configuring SAN fabric to match logical unit numbers (LUNs) to the proper servers.
  • MAID (massive array of idle disks) - MAID (massive array of idle disks) is a storage technology in which only those disk drives in active use are spinning at any given time.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • managed storage - Managed storage is the process of offloading an organization’s data storage requirements to an outside managed service provider.
  • Massachusetts data protection law - What is the Massachusetts data protection law?The Massachusetts data protection law is legislation that stipulates security requirements for organizations that handle the private data of residents.
  • Maxta MxSP (Maxta Storage Platform) - The Maxta Storage Platform is a hyper-converged infrastructure product that is sold as software or a reference architecture and used for virtual machine storage.
  • memory management - Memory management is the process of controlling and coordinating computer memory, assigning portions called blocks to various running programs to optimize overall system performance.
  • memory management unit (MMU) - A memory management unit (MMU) is a computer hardware component that handles all memory and caching operations associated with the processor.
  • Microsoft Azure File Service - Microsoft Azure File Service is a service that allows Windows Server admins to access SMB shares in the Azure cloud by setting up file shares in the Azure management console.
  • Microsoft Azure Premium Storage - Microsoft Azure Premium Storage is solid-state drive storage for Azure virtual machines for workloads that require low latency and high throughput.
  • Microsoft Exchange Server Jetstress - Microsoft Exchange Server Jetstress is a tool that administrators can use to validate their Exchange Server storage configuration.
  • Microsoft Storage QoS (Storage Quality of Service) - Microsoft Storage QoS (Storage Quality of Service) is a feature for monitoring and managing the performance of storage resources allocated to individual virtual machines (VMs) running on Hyper-V and scale-out file servers or cluster shared volumes.
  • Microsoft Storage Replica - Microsoft Storage Replica is a feature in Windows Server 2016 that provides synchronous block-level, volume-based replication for high availability and disaster recovery needs.
  • Microsoft Storage Spaces Direct - Microsoft Storage Spaces Direct is a feature in Windows Server 2016 that uses local server storage to build highly available and scalable software-defined storage systems for Hyper-V virtual machines.
  • mount point - Whether it comes from a partition on the same drive, a new hard drive, media inserted into an optical drive or some form of flash memory, any file system must be mounted before it can be displayed and its file system read.
  • Mozy (by Dell) - Mozy (by Dell) was a cloud backup service owned by Dell EMC that targeted customers ranging from consumers through to the enterprise.
  • mSATA SSD (mSATA solid-state drive) - An mSATA SSD is a small-form-factor solid-state drive designed for portable devices such as laptops and tablets.
  • multiprotocol storage - Multiprotocol storage, also known as unified or federated storage, supports protocols traditionally associated with SAN block-based and NAS file-based storage in a single device.
  • N_Port ID virtualization (NPIV) - N_Port ID virtualization (NPIV) is a technology that allows a single host bus adaptor (HBA) called an "N_Port" to register multiple World Wide Port Names (WWPNs) and N_Port identification numbers.
  • NAS Appliance - NAS appliances are commodity hardware that includes their own dedicated storage disks and RAID that can easily scale as more capacity is needed.
  • NAS filer (network-attached storage filer) - NAS filers add scalable, expandable storage for file-serving purposes in data sharing, cloud applications, Internet and enterprise networks, in both Fibre Channel SANs and Ethernet LANs.
  • NAS gateway - A NAS gateway is a NAS (network-attached storage) system in which the storage media are externally attached, typically over a Fibre Channel interface.
  • near-continuous data protection (near CDP) - Near-continuous data protection, sometimes called near-continuous protection, is a general term for backup and recovery products that take snapshots at set intervals.
  • NetApp - NetApp, formerly Network Appliance Inc.
  • NetApp Data Fabric - The products and services that compose NetApp’s Data Fabric are designed to provide customers with the agility they need to quickly and efficiently move data to and from the cloud.
  • NetApp Insight - NetApp Insight is an annual technical conference series for NetApp, a computer storage and data management company.
  • NetApp SolidFire - NetApp SolidFire is a business division of NetApp Inc.
  • non-disruptive data migration - Non-disruptive data migration is a feature that allows data movement from one storage device to another without causing downtime in the environment.
  • NVDIMM (Non-Volatile Dual In-line Memory Module) - An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close