Active Directory (AD) is a directory service from Microsoft that is based on the LDAP protocol. It is often used to authorize and authenticate users or devices and can only be used in a Windows OS. Read more
Active/Active is the name for a cluster architecture in which two or more servers process data simultaneously. Read more
A cluster in active/passive mode processes all the data on one “active” server, which is then replicated to a “passive” server or servers. This This essentially creates a functional backup that is ready to take over the tasks of the “active” server in case of failure. Read more
All Flash Storage is the term for a disk array that contains only flash storage (SSD). This storage type is also referred to as a Solid-State Array (SSA). Read more
CIS Benchmarks represent a set of globally respected best practices for protecting IT systems against cyber threats. Benchmarking generally compares a system to official recommendations from, e.g., hardware manufacturers, software publishers, or institutions. Read more
Cloud computing is defined as accessing a service, program, or other software remotely over an internet connection. This model is based on a shared infrastructure of hardware and software resources at the service provider’s data centre, offering high and guaranteed availability. Read more
Data durability means data consistency and resiliency to various threats over a long period. It is an important characteristic for data storage since it reflects its ability to cope with, for example, disk failures or fragmented data on a particular storage infrastructure node. Read more
Data ingestion is loading data from one or more sources to a target location for further processing. The data ingestion process may also be in real-time or in batches at various intervals. In some cases, a combination of both methods is used. Read more
Fork is the term for branching a project; it is most often used in the context of software development. When a fork is founded, it creates an alternative version of the original software, which is further developed in its own way. Thus, although the two software variants are identical at the point of forking, they gradually become increasingly different projects. Read more
Free cooling represents an economical method of cooling data centres by way of taking the warm air out of the data centre and bringing in the cool outside air. This eliminates expensive compressor cooling. Read more
In a geo-cluster, data is stored on two or more nodes in geographically separated locations. If one node fails, the service continues to run from the other location. Thus, geo-clusters are characterised by high availability and help prevent data loss. Read more
The 403 Forbidden status code (sometimes called “access denied”) is displayed when a user is not authorised to view a certain page. Thus, the server understands the client’s request but cannot comply without authorisation. Read more
The 500 Internal Server Error page signalises an unspecified server-side error. Unfortunately, it is also the most generic 5xx status code, and sometimes, it is difficult to determine the cause. Read more
Hypervisor is software that can virtualise hardware resources into isolated virtual machines. They can also run different operating systems, meaning multiple operating systems run on a single piece of hardware. However, all applications, services, and development environments are operated in isolation. Read more
Microservices refer to smaller applications that are interconnected and form the architecture of more complex software. The advantage is faster development and the ability to create and test individual microservices in isolation. Read more
On-demand services are focused on satisfying customer needs as quickly as possible without requiring a large initial investment. Typically, these are services for which you pay a regular monthly fee or pay-as-you-go. Read more
Out-of-band is the term for communication outside the main channel or data transmission over another frequency band. Out-of-band is used, for example, in managed servers. Read more
Rack housing is a kind of server housing where a company uses an entire rack (or a significant part of it) for its servers in a data centre. Enterprises with many servers and technologies, such as routers or switches, mostly use this service. Read more
Redundancy means excess over the necessary. In the context of IT technology, the word redundancy is used in various ways. Read more
The abbreviation SPOF (single point of failure) is a term for a weak spot in the IT infrastructure. When this point of the infrastructure fails, the entire system becomes inoperable. Read more
Storage all flash is the term for a disk array that contains only flash storage (SSD). This type of storage is also sometimes known as a Solid-State Array. Read more
The vCloud Director platform enables virtual machine deployment, automation, and management. With its multitenant architecture, hosting providers also use it to administer customer cloud services. Read more
A zero-day attack is a type of cyber-attack that exploits a vulnerability in software that the developers are not yet aware of. Read more