Browse Definitions :

Virtualization

Terms related to virtualization, including definitions about virtualization technologies and words and phrases about server virtualization, desktop virtualization and storage virtualization.

WIN - ZOM

  • Windows as a service - Windows as a service is the approach Microsoft introduced with Windows 10 to deploy, update and service the operating system.
  • Windows File Share Witness (FSW) - A Windows File Share Witness is a file share available to nodes in a high availability cluster.
  • Windows Thin PC - Windows Thin PC (WinTPC)  is a stripped down version of Windows 7 for legacy PCs that do not have the resources to support a full version of Windows 7.
  • Windows XP Mode - Windows XP Mode is a feature of the Windows 7 operating system that allows it to run applications that are only compatible with Windows XP.
  • workload automation - Workload automation is the practice of using software to schedule, initiate, run and manage tasks related to business processes and transactions.
  • World Wide Name (WWN) - A World Wide Name (WWN) is a unique identifier that is assigned to a manufacturer by the Institute of Electrical and Electronic Engineers (IEEE) and hard-coded into a Fibre Channel (FC) device.
  • XaaS (Anything as a Service) - XaaS is a general, collective term that refers to the delivery of anything as a service.
  • Xen - Xen is the open source hypervisor included in the Linux kernel and, as such, it is available in all Linux distributions.
  • zero client - Zero client, also known as ultrathin client, is a server-based computing model in which the end user has no local software and very little hardware.
  • zombie VM - A zombie VM is a virtual machine that is created, often for a particular purpose, that is forgotten when it is no longer needed for that purpose.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close