Browse Definitions :

Virtualization

Terms related to virtualization, including definitions about virtualization technologies and words and phrases about server virtualization, desktop virtualization and storage virtualization.

WIN - ZOM

  • Windows as a service - Windows as a service is the approach Microsoft introduced with Windows 10 to deploy, update and service the operating system.
  • Windows File Share Witness (FSW) - A Windows File Share Witness is a file share available to nodes in a high availability cluster.
  • Windows Thin PC - Windows Thin PC (WinTPC)  is a stripped down version of Windows 7 for legacy PCs that do not have the resources to support a full version of Windows 7.
  • Windows XP Mode - Windows XP Mode is a feature of the Windows 7 operating system that allows it to run applications that are only compatible with Windows XP.
  • workload automation - Workload automation is the practice of using software to schedule, initiate, run and manage tasks related to business processes and transactions.
  • World Wide Name (WWN) - A World Wide Name (WWN) is a unique identifier that is assigned to a manufacturer by the Institute of Electrical and Electronic Engineers (IEEE) and hard-coded into a Fibre Channel (FC) device.
  • XaaS (Anything as a Service) - XaaS is a general, collective term that refers to the delivery of anything as a service.
  • Xen - Xen is the open source hypervisor included in the Linux kernel and, as such, it is available in all Linux distributions.
  • zero client - Zero client, also known as ultrathin client, is a server-based computing model in which the end user's computing device has no local storage.
  • zombie VM - A zombie VM is a virtual machine that is created, often for a particular purpose, that is forgotten when it is no longer needed for that purpose.

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close