Information Management


All | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | Other


All

There are 410 entries in the glossary.
Pages: «1 2 3 4 5 6 7 8 9

Term Definition
WorkflowThe process of organising business processes as a controlled sequence of activities.
 
WORMStorage. Write Once Read Many
 
Write PrecompensationStorage products. With the change of the speed of the disk relative to the head (changes from track to track due to varying disk diameter), the data bit also travels within the read window margin. In order that this does not lead to read errors, the write data are shifted in time. This is done starting with a specific track.
 
XHTMLThe Extensible HyperText Markup Language (XHTML™) is a family of specifications that reproduce and extend HTML, reformulated in XML. It is the successor of HTML and places greater emphasis on well formed documents.
 
XMLExtensible Markup Language is designed to improve the functionality of the Web by providing more flexible and adaptable information identification. XML is actually a 'metalanguage' - a language for describing other languages - which lets you design your own customised markup languages for limitless different types of documents.
 
XML-RPCXML-RPC is a simple remote procedure call protocol encoded in XML. XML-RPC allows one computer to cause the execution of code on another machine. The advantage of encoding in XML is that XML is in itself plain text and understandable by almost all platforms.
 
Yellow BookA CD-ROM format which is ISO 9660 compliant and uses mode 1 addressing. Discs of this type can be played on most drives and would be appropriate for most multimedia applications which have been developed for personal computers.
 
Yottabyte (YB)This is 2^80 bytes, or 1024 zettabytes.
 
Zettabyte (ZB)This is 2^70 bytes, or 1024 exabytes.
 
ZoningThe process of allocating resources in a SAN to load balance the devices connected to the network. Zoning allows the network administrator to separate the SAN into units and allocate storage to those units based on need. Zoning protects the SAN system from such threats as viruses, data corruption and malicious hackers as the devices in their respective zones are not able to communicate outside the zone through their ports unless given permission.
 


All | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | Other


Glossary V1.8
Copyright 1998 - 2010 Audata Ltd. All rights reserved.
Audata Ltd, 30 Salisbury Road, Canterbury, Kent, CT2 7HH, UK
Tel: +44(0)203 303 0354 Email: info@audata.co.uk
Audata Ltd. is registered in England, number 355 1839.