836 Results for:shoretel%20loss
- Sort by:
cybercrime
Cybercrime is any criminal activity that involves a computer, network or networked device. Read Full Definition
Associated Glossaries
chatty protocol
A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again. Read Full Definition
Associated Glossaries
JBOD (just a bunch of disks)
JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks. Read Full Definition
fault management
Fault management is the component of network management that detects, isolates and fixes problems. Read Full Definition
Associated Glossaries
Link Control Protocol (LCP)
In computer networking, Point-to-Point Protocol (PPP) provides a standard way to transport multiprotocol data over point-to-point links; within PPP, Link Control Protocol (LCP) establishes, configures and tests ... Read Full Definition
project constraint
A constraint in project management is any restriction that defines a project's limitations. Read Full Definition
Associated Glossaries
information rights management (IRM)
Information rights management (IRM) is a discipline that involves managing, controlling and securing content from unwanted access. Read Full Definition
Associated Glossaries
private key
A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt data. Read Full Definition
Associated Glossaries
Cloud-to-Cloud Backup (C2C Backup)
C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service. The backup stored on the second cloud service serves the same purpose as an off-site backup. Read Full Definition
Associated Glossaries
risk analysis
Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. Read Full Definition
Associated Glossaries