Browse Definitions :

Storage architecture

Definitions about storage and data management including backup/recovery vocabulary, business intelligence terminology, storage area networks and database management.
  • storage virtualization - Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage device -- or pool of available storage capacity.
  • storage volume - A storage volume is an identifiable unit of data storage.
  • synchronous replication - Synchronous replication is the process of copying data over a network to create multiple current copies of the data.
  • tape backup - Tape backup is the practice of periodically copying data from a primary storage device to a tape cartridge.
  • TCP/IP - TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet.
  • tebibyte (TiB) - A tebibyte (TiB) is a unit of measure used to describe computing capacity.
  • Terabyte (TB) - A terabyte (TB) is a unit of digital data that is equal to about 1 trillion bytes.
  • throughput - Throughput is a measure of how many units of information a system can process in a given amount of time.
  • Tier 0 - Tier 0 is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage hierarchy.
  • tiered storage - Tiered storage is a method for assigning different categories of data to various types of storage media to reduce overall storage costs and improve the performance and availability of mission-critical applications.
  • TLC flash (triple-level cell flash) - TLC flash (triple-level cell flash) is a type of NAND flash memory that stores three bits of data per cell.
  • U.2 SSD (formerly SFF-8639) - A U.2 SSD is a high-performance data storage device designed to support the Peripheral Component Interconnect Express (PCIe) interface using a small form factor (SFF) connector that is also compatible with standard Serial-Attached SCSI (SAS) and Serial Advanced Technology Attachment (SATA)-based spinning disks and solid-state drives (SSDs).
  • unified storage - Unified storage -- sometimes called network unified storage or multiprotocol storage -- is a storage system that enables users to run and manage files and applications from a single device.
  • unzipping - Unzipping is the act of extracting the files from a zipped single file or similar file archive.
  • utility storage - Utility storage is a service model in which a provider makes storage capacity available to an individual, organization or business unit on a pay-per-use basis.
  • value chain - A value chain is a concept describing the full chain of a business's activities in creating a product or service -- from initial receipt of materials through its delivery to market.
  • vector search - Vector search, sometimes referred to as vector similarity search, is a technique that uses vectors -- numerical representations of data -- as the basis to conduct searches and identify relevance.
  • virtual disaster recovery - Virtual disaster recovery is a type of DR that typically involves replication and enables a user to fail over to virtualized workloads.
  • virtual LUN (virtual logical unit number) - A virtual LUN (virtual logical unit number) is a representation of a storage area that is not tied to any physical storage allocation.
  • volatile memory - Volatile memory is a type of memory that maintains its data only while the device is powered.
  • wear leveling - Wear leveling is a process that is designed to extend the life of solid-state storage devices.
  • Western Digital Corporation (WDC) - Western Digital Corporation (often referred to as WDC, Western Digital) is a data storage device manufacturer founded in 1970 and headquartered in San Jose, Calif.
  • What is a SAN? Ultimate storage area network guide - A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
  • What is cloud management? Definition, benefits and guide - Cloud management refers to the exercise of control over public, private or hybrid cloud infrastructure resources and services.
  • What is network-attached storage (NAS)? A complete guide - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • Windows Server Failover Clustering (WSFC) - Windows Server Failover Clustering (WSFC) enables several computers to host a service, and if one has a fault, the remaining computers automatically take over the hosting of the service.
  • World Wide Name (WWN) - A World Wide Name (WWN) is a unique identifier that is hard-coded into each Fibre Channel (FC) device by the device's manufacturer.
  • write amplification factor (WAF) - Write amplification factor (WAF) is a numerical value that represents the amount of data a solid-state drive (SSD) controller writes in relation to the amount of data that the host's flash controller writes.
  • write endurance - Write endurance is the number of program/erase (P/E) cycles that can be applied to a block of flash memory before the storage media becomes unreliable.
  • zebibyte (ZiB) - A zebibyte (ZiB) is a unit used to measure computing and storage capacity.
Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close