Browse Definitions :

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

VIR - ZER

  • virtual appliance - Considered a software equivalent of a hardware device, a virtual appliance (VA) is a preconfigured software solution.
  • virtual desktop - A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.
  • virtual local area network hopping (VLAN hopping) - Virtual local area network hopping (VLAN hopping) is a method of attacking the network resources of a VLAN by sending packets to a port not usually accessible from an end system.
  • virtual LUN (virtual logical unit number) - A virtual LUN (virtual logical unit number) is a representation of a storage area that is not tied to any physical storage allocation.
  • virtual network adapter - A virtual network adapter is software that operates like a physical network adapter within the host operating system (OS) or through an application installed on the endpoint or server.
  • virtual network functions (VNFs) - Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.
  • virtual networking - Virtual networking is the abstraction of network resources from the underlying physical network infrastructure.
  • virtual phone number - A virtual phone number is a telephone number is used to route calls to the user's actual phone number or numbers.
  • virtual SAN appliance (VSA) - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
  • virtual server - A virtual server, also known as a virtual machine (VM), is a partitioned space inside a real server and is transparent to users, replicating the functionality of a dedicated physical server.
  • virtualization sprawl (VM sprawl) - Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where administrators can no longer manage them effectively.
  • visitor-based networking (visitor-based network) - Visitor-based networking (VBN) is a computer network with high-speed internet access provided by an organization for temporary use by visitors, guests or other users in a public area.
  • VLAN (virtual LAN) - A virtual LAN (VLAN) is a logical overlay network that groups together a subset of devices that share a physical LAN, isolating the traffic for each group.
  • VPN (virtual private network) - A virtual private network (VPN) is a service that creates a safe, encrypted online connection.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • WAN (wide area network) - A wide area network (WAN) is a geographically distributed private telecommunications network that interconnects multiple local area networks (LANs).
  • WAN optimization (WAN acceleration) - WAN optimization -- also known as WAN acceleration -- is a collection of technologies and techniques used to improve the efficiency of data transfer across a wide area network (WAN) between organizations' centralized data centers and their remote locations.
  • web server - A web server is software and hardware that uses HTTP (Hypertext Transfer Protocol) and other protocols to respond to client requests made over the World Wide Web.
  • What is a private cloud? - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • What is a Server? - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
  • What is configuration management? A comprehensive guide - Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.
  • What is desktop management and how does it work? - Desktop management is a comprehensive approach to managing all the computers within an organization.
  • What is IT/OT convergence? Everything you need to know - IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.
  • What is NetOps? Everything you need to know - NetOps, also referred to as NetOps 2.
  • What is network virtualization? Everything you need to know - Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between VMs.
  • What is network-attached storage (NAS)? A complete guide - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • What is PaaS? Platform as a service definition and guide - Platform as a service (PaaS) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.
  • What is SD-WAN? Software-defined WAN explained - Software-defined WAN is a technology that uses software-defined networking concepts to distribute network traffic across a wide area network, or WAN.
  • What is server sprawl and how to prevent it? - Server sprawl is when multiple underutilized servers take up more space and consume more resources than can be justified by their workload.
  • wildcard certificate - A wildcard certificate is a digital certificate that is applied to a domain and all its subdomains.
  • Windows Server 2012 (WS 2012) - Windows Server 2012, formerly codenamed Windows Server 8, is the latest version of Windows Server.
  • Windows Server Update Services (WSUS) - Windows Server Update Services (WSUS) is a Windows server role that can plan, manage and deploy updates, patches and hotfixes for Windows servers, client operating systems and other Microsoft software.
  • wireless ad hoc network (WANET) - A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure equipment, such as a wireless router or access point.
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN) without requiring that they connect through a wired backbone.
  • wireless mesh network (WMN) - A wireless mesh network (WMN) is a mesh network created through the connection of wireless access point (WAP) nodes installed at each network user's locale.
  • wireline communication - Wireline communication (also known as wired communication) is the transmission of information over a physical filament.
  • Wireshark - Wireshark is an open source tool for analyzing packets and profiling network traffic.
  • Yellowdog Updater, Modified (YUM) - Yellowdog Update, Modified (YUM) is a program that manages installation, updates and removal for Red Hat package manager (RPM) systems.
  • Zabbix - Zabbix is an open source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services.
  • zero client - Zero client, also known as ultrathin client, is a server-based computing model in which the end user's computing device has no local storage.
  • zero-touch provisioning (ZTP) - Zero-touch provisioning (ZTP) is a method of setting up devices that automatically configures the device using a switch feature.
Networking
Security
  • security posture

    Security posture refers to an organization's overall cybersecurity strength and how well it can predict, prevent and respond to ...

  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides organizations with guidelines and principles ...

  • voice squatting

    Voice squatting is an attack vector for voice user interfaces, or VUIs, that exploits homonyms -- words that sound the same, but ...

CIO
  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • skunkworks project (Skunk Works)

    A skunkworks project, also known as Skunk Works, is an innovative undertaking, involving a small group of people, that is outside...

  • digital innovation

    Digital innovation is the adoption of modern digital technologies by a business.

HRSoftware
  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • skill-based learning

    Skill-based learning develops students through hands-on practice and real-world application.

  • gamification

    Gamification is a strategy that integrates entertaining and immersive gaming elements into nongame contexts to enhance engagement...

Customer Experience
  • virtual assistant (AI assistant)

    A virtual assistant, also called an AI assistant or digital assistant, is an application program that understands natural ...

  • Microsoft Dynamics 365

    Dynamics 365 is a cloud-based portfolio of business applications from Microsoft that are designed to help organizations improve ...

  • Salesforce Commerce Cloud

    Salesforce Commerce Cloud is a cloud-based suite of products that enable e-commerce businesses to set up e-commerce sites, drive ...

Close