478 Results for:shoretel loss

  • Sort by: 

risk assessment

Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business. Read Full Definition

Associated Glossaries

over sampling and under sampling

Over sampling and under sampling are techniques used in data mining and data analytics to modify unequal data classes to create balanced data sets. Read Full Definition

single point of failure (SPOF)

A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system in which one fault or malfunction causes an entire system to stop operating. Read Full Definition

Associated Glossaries

iSCSI switch (Internet Small Computer System Interface switch)

An iSCSI switch is an appliance that processes and channels data between an iSCSI initiator and target on a storage device. Read Full Definition

romance scam

A romance scam is a fraudulent scheme in which a swindler pretends romantic interest in a target, establishes a relationship and then attempts to get money or sensitive information from the target under various ... Read Full Definition

Associated Glossaries

event sourcing

Event sourcing is a coding practice used by computer programmers to model a system as a sequence of events in order to identify the changes made over time. Read Full Definition

Associated Glossaries

IBM OpenPages

IBM OpenPages is a governance, risk and compliance (GRC) platform that centralizes services and components associated with the challenges and management of regulatory initiatives. Read Full Definition

buffer credits or buffer-to-buffer credits (BBCs)

Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable. Read Full Definition

alien crosstalk (AXT)

Alien crosstalk (AXT) is electromagnetic noise that can occur in a cable that runs alongside one or more other signal-carrying cables. Read Full Definition

Associated Glossaries

confidentiality, integrity and availability (CIA triad)

Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. Read Full Definition