Word of the Day - GURU advisor

Thin Client


A thin client is a computer connected to a network which locally has limited software and is highly dependant upon the resources available on the network. Historically, this concept is related to mainframes, when clients were only used to connect to the central computer, which had a very powerful hardware and only ran software used remotely.

Upstream

 

Upstream is the term used to indicate the sending or the flux of data from a client towards a server or remote destination. The speed at which the data transmission happens is called upstream rate.

WiGig

WiGig is a new standard about data transmission on WiFi channels developed by the Wireless Gigabit Alliance (formed by giants such as AMD, Cisco, Dell, Broadcom,Intel Marvell, Nokia etc..) with the goal of promoting the improvement of speed in wireless connections. WiGig is also known as standard IEEE 802.11ad.

Data Integrity

The term Data Integrity, when referred to an IT network frame, refers to the characteristics of completeness, accuracy and coherence of transmitted data. Data integrity is detected at the beginning and at the ending of a network transmission and it can be verified by means of checks on errors and related errors identification and correction protocols.

Bandwidth

Bandwidth is a generic terms that defines the measure of transmitting capacity of a certain communication means (it’s usually expressed in bit/Kbit/Mbit/Gbit per second).

It can be used as a unit of measure regardless of the specific technology the transmission is realized with: cable, optical fibre, wireless, etc..

Bridge Router

The term Bridge Router describes a network device that can be act both as a bridge and as a router. It can forward packets to the devices connected to LAN networks when there are no routing information and to external networks by means of TCP/IP. A bridge router works within the network and data link layers of the OSI model.

Cloud VPN

The term Cloud VPN describes a type of Virtual Private Network that leverages a Cloud platform to realize a private virtual connection between hosts instead of dedicated, on-premises servers and gateways for OpenVPN and the like. This way you can give a global VPN access to users by means of a cloud platform that can be reached anywhere with an Internet connection.
This kind of service is also known as Hosted VPN and VPN as a Service (VPNaaS).

Egress Filtering

 

The term Egress Filtering represents a technique used in network security that is about filtering outgoing traffic with a dedicated firewall, before data is transmitted to other networks. This approach, which can prevent the diffusion of non-authorized traffic, is based on the analysis of data packets going across the firewall, which must be configured accordingly.

Darknet

The term Darknet indicates all networks that are not indexed by the main search engines (ie. Google, Yahoo, Bing). Access and browsing on such networks is granted only to determined groups of users and often require an authorization, given the fact they are not publicly visible.
Moreover, browsing requires dedicated software, like the TOR browser used for the Deep Web.

Storage snapshot

 

A Storage Snapshot can be defined as a set of pointers (a kind of table) describing data saved on a particular storage. Snapshots can be applied to different storage devices (hard disks, SAN, specific file system, etc..).
The presence of snapshots in some cases (ie ZFS) allows to perform a rollback and bring back the storage to a previous working state after a malfunctioning or damage.

.htaccess


The .htaccess file is a configuration file of the Apache Web server that allows the administrator to define additional folder access and addressing options. Such file uses the same syntax of the other Apache configuration files and it must be placed inside the folder of the Web server that has to be configurated.
The use of .htaccess files guarantees an high control granularity on folders-

IP Class

IP address classes are a classification used to define the addressing spaces of IPv4. This structure is defined in such a way that it the subnet mask can be deduced by the first bits of the address. Addressing classes goes from A to E, and as the class gets higher, the ratio prefix/suffix of the address changes, with a consequent definition of the difference between the number of networks and the number of clients per network that can be indexed.

Clustered Storage

The term Clustered Storage defines the use of two or more storage servers working together in order to improve the resulting performances, capacity and reliability. The presence of a clustered storage inside an infrastructure also allows to distribute the workload.

Converged Infrastructure


The term Converged Infrastructure describes an approach to the management of data centers that aims to minimize compatibility problems between different hardware platforms, which are common in this context. Convergence is implemented by realizing dedicated appliances with an hyper-converged approach.

IAC

IAC stands for Infrastructure as a Code and defines all kinds of iT infrastructures that can be managed in an automated manner by means of code, instead of needing manual work. The approach is similar to scripting, and the difference in an IAC context is that the level of the operations is higher than the simple iterations of a static code. That can be done also thanks to high level programming languages.

Cross Platform

The term Cross Platform describes those products or systems that work properly on different platforms or operating systems. Synonyms of Cross Platform are Multiplatform and Platform Indipendent.

Cloud DR


The term Cloud DR identifies these backup and restore strategies applied to IT infrastructures, which include the use of the Cloud as repository for additional copies, thus guaranteeing the complete availability for the restore procedures in case of failover.

Scareware


The term Scareware defines a category of harmful software that misleads users to visit infected Web sites. Usually it appears as a pop-up window or a fake Web page warning the user about the presence of PC infections and providing one (or more) links to visit in order to remove the supposed infection. The main goal of scareware is to steal personal information from the victim.

Service Desk


The term Service Desk defines, in general, the communication service made available by a company providing services to its own clients. Service Desk corresponds to SPOC (Single Point of Contact) between a provider and its own users, suppliers and partners, provides information and manages warnings about faults and issues.

SLA


SLA stands for Service Level Agreement and identifies the contractual tools which define service and intervention metrics that must be respected by a provider when assisting a client. An example of SLA is intervention time in case of needing, per failure typology and period of the year (week-ends, night, holidays, etc..). In this context the use of dedicated PSA software is suggested.

PSA


PSA stands for Professional Service Automation Software and defines a family of platforms for the management and control of duties and resources, also including scheduling and time-tracking capabilities. They also include several features about archiving management, notification (more on the administrative side rather than technical) and invoicing.

Patch Management


The term Patch Management defines that class of software used to check and distribute patches and updates to one or more administered computers. Such platforms help to monitor the update status of the machines, can send alerts, select certain updates for every specific case and, when needed, force installations.

RMM

RMM stands for Remote Monitoring and Management and defines the set of software that can be used to control and monitor IT infrastructures, also remotely. This set of tool helps to collect information and keep under control hardware and software assets of a certain client (for instance, in a MSP context), and includes tools for remote control and monitoring with automated notification system.

Outsourcing


Outsourcing is a practice used by companies in which a third party is enrolled to perform certain activities related to the main business. In the IT world, this approach can help to reduce costs and improve efficiency in those situations where the making of an on-premises infrastructure require more resources than the ones available.

banner eng

fb icon evo twitter icon evo

Word of the Day

The term Edge Computing refers, when used in the cloud-based infrastructure sphere, the set of devices and technologies that allows...

>

The acronym SoC (System on Chip) describes particular integrated circuit that contain a whole system inside a single physical chip:...

>

The acronym PtP (Point-to-Point) indicates point-to-point radio links realized with wireless technologies. Differently, PtMP links connects a single source to...

>

Hold Down Timer is a technique used by network routers. When a node receives notification that another router is offline...

>

In the field of Information Technology, the term piggybacking refers to situations where an unauthorized third party gains access to...

>
Read also the others...

Download of the Day

Netcat

Netcat is a command line tool that can be used in both Linux and Windows environments, capable of...

>

Fiddler

Fiddler is a proxy server that can run locally to allow application debugging and control of data in...

>

Adapter Watch

Adapter Watch is a tool that shows a complete and detailed report about network cards. Download it here.

>

DNS DataView

DNS DataView is a graphical-interface software to perform DNS lookup queries from your PC using system-defined DNS, or...

>

SolarWinds Traceroute NG

SolarWinds Traceroute NG is a command line tool to perform advanced traceroute in Windows environment, compared to the...

>
All Download...

Issues Archive

  •  GURU advisor: issue 21 - May 2019

    GURU advisor: issue 21 - May 2019

  • GURU advisor: issue 20 - December 2018

    GURU advisor: issue 20 - December 2018

  • GURU advisor: issue 19 - July 2018

    GURU advisor: issue 19 - July 2018

  • GURU advisor: issue 18 - April 2018

    GURU advisor: issue 18 - April 2018

  • GURU advisor: issue 17 - January 2018

    GURU advisor: issue 17 - January 2018

  • GURU advisor: issue 16 - october 2017

    GURU advisor: issue 16 - october 2017

  • GURU advisor: issue 15 - July 2017

    GURU advisor: issue 15 - July 2017

  • GURU advisor: issue 14 - May 2017

    GURU advisor: issue 14 - May 2017

  • 1
  • 2
  • 3
  • BYOD: your devices for your firm

    The quick evolution of informatics and technologies, together with the crisis that mined financial mines, has brought to a tendency inversion: users that prefer to work with their own devices as they’re often more advanced and modern than those the companies would provide. Read More
  • A switch for datacenters: Quanta LB4M

    You don’t always have to invest thousands of euros to build an enterprise-level networking: here’s our test of the Quanta LB4M switch Read More
  • Mobile World Congress in Barcelona

    GURU advisor will be at the Mobile World Congress in Barcelona from February 22nd to 25th 2016!

    MWC is one of the biggest conventions about the worldwide mobile market, we'll be present for the whole event and we'll keep you posted with news and previews from the congress.

    Read More
  • 1