Browse Definitions :

Data centers

Definitions used in data center management, including hardware, virtualization and cloud computing.

Data backup and disaster recovery

Terms related to backup and recovery, including definitions about making copies of data and words and phrases about restoring original data after a data loss event.

  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • 3-2-1 backup strategy explained: Is it effective?

    The 3-2-1 backup is a time-tested data protection and recovery methodology for ensuring that data is protected adequately and up-to-date backup copies of the data are available when needed.

  • IT incident management

    IT incident management is a component of IT service management (ITSM) that aims to rapidly restore services to normal following an incident while minimizing adverse effects on the business.

View All Data backup and disaster recovery Definitions

Data center management

Terms related to data centers, including definitions about network operations centers (NOCs) and words and phrases about the storage, management and the transmission of data.

  • automatic transfer switch (ATS)

    An automatic transfer switch (ATS) is a device that automatically transfers a power supply from its primary source to a backup source when it senses a failure or outage in the primary source.

  • scalability

    In information technology, scalability (frequently spelled 'scaleability') has two uses: for a computer application to function with change in size and volume, and to take advantage of a rescale.

  • field-replaceable unit (FRU)

    In electronic hardware, particularly computer systems, a field-replaceable unit (FRU) is a circuit board or part that can be easily removed and replaced by the user or technician without having to send the product or system to a repair facility.

View All Data center management Definitions Back to Top

Linux

Definitions related to Linux, including tech terms about open source and words and phrases about Linux distributions and software development.

View All Linux Definitions Back to Top

Operating systems

Definitions related to operating systems, including tech terms about open source and proprietary operating systems and words and phrases about system programs, boot mechanisms, kernels, command interpreters, DLL libraries and drivers.

View All Operating systems Definitions Back to Top

Storage Admin

Terms related to data storage management, including definitions about enterprise storage and words and phrases about storage infrastructure, storage capacity and hierarchical storage management (HSM).

  • SSD caching

    SSD caching, also known as 'flash caching' or 'flash memory caching,' is the temporary storage of frequently-accessed data on NAND flash memory chips in a solid-state drive (SSD) to improve the drive's input/output (I/O) performance and allow data requests to be met with improved speed.

  • SSD TRIM

    SSD TRIM is a command for the Advanced Technology Attachment (ATA) interface that enables an operating system (OS) to inform a NAND flash solid-state drive (SSD) which data blocks it can erase because they are no longer in use.

  • Virtual Storage Access Method (VSAM)

    Virtual Storage Access Method (VSAM) is an access method for IBM's mainframe operating system, MVS, now called z/OS.

View All Storage Admin Definitions Back to Top

Storage and Data Mgmt

Definitions about storage and data management including backup/recovery vocabulary, business intelligence terminology, storage area networks and database management.

  • SSD caching

    SSD caching, also known as 'flash caching' or 'flash memory caching,' is the temporary storage of frequently-accessed data on NAND flash memory chips in a solid-state drive (SSD) to improve the drive's input/output (I/O) performance and allow data requests to be met with improved speed.

  • SCSI (Small Computer System Interface)

    SCSI (Small Computer System Interface) is an electronic interface that enables PCs and servers to communicate with peripheral hardware, such as storage devices, printers and scanners, faster and more flexibly than previous parallel data transfer interfaces.

  • SSD TRIM

    SSD TRIM is a command for the Advanced Technology Attachment (ATA) interface that enables an operating system (OS) to inform a NAND flash solid-state drive (SSD) which data blocks it can erase because they are no longer in use.

View All Storage and Data Mgmt Definitions Back to Top

Virtualization

Terms related to virtualization, including definitions about virtualization technologies and words and phrases about server virtualization, desktop virtualization and storage virtualization.

  • Linux Secure Boot

    Linux Secure Boot is a Hyper-V feature that Microsoft introduced in Windows 10 and Windows Server 2016. The feature allows specific Linux distributions to boot properly when running in Hyper-V generation 2 virtual machines.

  • What is cloud computing? Types, examples and benefits

    Cloud computing is a general term for the delivery of hosted computing services and IT resources over the internet with pay-as-you-go pricing.

  • second-level address translation (SLAT)

    Second-level address translation (SLAT) is a hardware virtualization technology that reduces hypervisor overhead. SLAT is now available in many kinds of processors, including those from Intel and AMD.

View All Virtualization Definitions Back to Top
Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close