Browse Definitions :

VMware

This glossary contains definitions related to VMware virtualization technologies. Some definitions explain the meaning of words used in VMware product and service documentation. Other definitions are related to the strategies that network engineers use when implementing server virtualization, virtual server consolidation and virtual desktop centralization.

CLO - VMW

  • Cloud Foundry - Cloud Foundry is an open source cloud platform as a service (PaaS) on which developers can build, deploy, run and scale applications on public and private cloud models.
  • CloudHealth Technologies - CloudHealth Technologies is a provider of hybrid cloud management software that's designed to help an organization increase its visibility into and across public and private cloud infrastructure.
  • dedicated cloud - A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.
  • Microsoft Azure VM Scale Sets - A Microsoft Azure VM Scale Set is a group of individual virtual machines (VMs) within the Microsoft Azure public cloud that IT administrators can configure and manage as a single unit.
  • Microsoft Windows Defender Device Guard - Windows Defender Device Guard is a security feature for Windows 10 Enterprise and Windows Server 2016 designed to use application whitelisting and code integrity policies to protect users' devices from malicious code that could compromise the operating system.
  • Nutanix Acropolis - Acropolis is a free server virtualization hypervisor developed by vendor Nutanix that is packaged on hyper-converged appliances, and can be used alongside competing hypervisors.
  • Storage vMotion - Storage vMotion is a component of VMware vSphere that allows the live migration of a running virtual machine's (VM) file system from one storage system to another, with no downtime for the VM or service disruption for end users.
  • VCAP (VMware Certified Advanced Professional) - VMware Certified Advanced Professional (VCAP) is VMware's third highest certification level out of four levels.
  • VCB proxy (VMware Consolidated Backup proxy) - VCB proxy (VMware Consolidated Backup proxy) is the server that collects virtual machine (VM) backup data from VMware Consolidated Backup.
  • VCDX (VMware certified design expert) - VCDX (VMware certified design expert) is VMware's highest certification level.
  • VM BIOS (virtual machine basic input/output system) - A VM BIOS (virtual machine basic input/output system) is the set of instructions that controls the booting process of a virtual machine.
  • VM hardware version (virtual machine hardware version) - The VM hardware version (virtual machine hardware version) designates the virtual hardware functions supported by a virtual machine (VM), which relates to the hardware on the host server.
  • VMkernel - VMkernel is a POSIX-like operating system developed by VMware.
  • VMUG (VMware User Group) - A VMUG (VMware User Group) is an international community of VMware users whose goal is to share knowledge.
  • VMUG Advantage (VMware User Group Advantage) - VMUG Advantage is a subscription-based membership offered by VMware User Group (VMUG).
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Twofish

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close