Browse Definitions :
245 results for:

compressed

data compression

Definition | searchStorage

Data compression is a reduction in the number of bits needed to represent data.

Digital Data Storage (DDS, DDS-1, DDS-2, DDS-3, DDS-4)

Definition | WhatIs.com

Digital Data Storage (DDS) is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.

data center interconnect (DCI)

Definition | SearchNetworking

Data center interconnect (DCI) is a segment of the networking market that focuses on the technology used to link two or more data centers so the ...

NTFS (NT file system; sometimes New Technology File System)

Definition | SearchWindowsServer

NTFS (NT file system; sometimes New Technology File System) is the file system that the Windows NT operating system uses for storing and retrieving ...

remote desktop protocol (RDP)

Definition | SearchEnterpriseDesktop

Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual ...

Real-Time Transport Protocol (RTP)

Definition | SearchNetworking

The Real-Time Transport Protocol (RTP) is an Internet protocol standard that specifies a way for programs to manage the real-time transmission of ...

tape library

Definition | SearchDataBackup

In data storage, a tape library is a collection of magnetic tape cartridges and tape drives.

QoS (quality of service)

Definition | SearchUnifiedCommunications

Quality of service (QoS) refers to any technology that manages data traffic to reduce packet loss, latency and jitter on the network.

converged secondary storage

Definition | SearchDataBackup

Converged secondary storage is a combination of common data protection elements and non-primary storage tasks into one platform.

unified storage (multiprotocol storage)

Definition | SearchStorage

Unified storage -- sometimes called network unified storage or multiprotocol storage -- is a storage system that runs and manages files and ...

bar code (or barcode)

Definition | SearchERP

A bar code (often seen as a single word, barcode) is the small image of lines (bars) and spaces that is affixed to retail store items, identification...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • file system

    In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • cache (computing)

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

Close