836 Results for:shoretel%20loss

  • Sort by: 

cybercrime

Cybercrime is any criminal activity that involves a computer, network or networked device. Read Full Definition

chatty protocol

A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again. Read Full Definition

JBOD (just a bunch of disks)

JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks. Read Full Definition

fault management

Fault management is the component of network management that detects, isolates and fixes problems. Read Full Definition

Associated Glossaries

Link Control Protocol (LCP)

In computer networking, Point-to-Point Protocol (PPP) provides a standard way to transport multiprotocol data over point-to-point links; within PPP, Link Control Protocol (LCP) establishes, configures and tests ... Read Full Definition

project constraint

A constraint in project management is any restriction that defines a project's limitations. Read Full Definition

information rights management (IRM)

Information rights management (IRM) is a discipline that involves managing, controlling and securing content from unwanted access. Read Full Definition

private key

A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt data. Read Full Definition

Cloud-to-Cloud Backup (C2C Backup)

C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service. The backup stored on the second cloud service serves the same purpose as an off-site backup. Read Full Definition

Associated Glossaries

risk analysis

Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. Read Full Definition