Glossary

What term are you interested in?

All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

Access Node Control Protocol (ANCP)

A Layer 2 TCP protocol facilitates communication between access nodes like digital subscriber line access multiplexers (DSLAMs) and Layer 3 subscriber-aware controllers such as broadband remote ...

Access Point (AP)

An access point is a hardware device acting as a communication hub that enables wireless device users to connect to a wired local area network (LAN). This hub serves as a pivotal connection point, ...

Active Optical Cable (AOC)

An AOC is a high-performance cable with low power consumption that uses the same electrical inputs as traditional copper cables but incorporates optical fiber between the connectors and ...

Airside Economization

This cooling technique leverages outside air to cool data center facilities,significantly reduceing reliance on traditional mechanical cooling systems. Airside economization takes advantage of cooler ...

Application and Threat Intelligence (ATI)

Threat intelligence data, gathered and distributed in real time, provides up-to-the-moment insights on network security and application security. This information is vital for network infrastructure, ...

ASHRAE Thermal Guidelines

The American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) regularly updates guidelines for optimal data center temperatures to ensure computing equipment performs at its ...

ASTS (Automatic Static Transfer Switches)

Automatic Static Transfer Switches are designed to transfer power between multiple sources, typically shifting from an unstable source to a stable one. These switches play a crucial role in ensuring ...

Autonomous System Number (ASN)

An autonomous system number (ASN) is a unique numeric identifier assigned to a network for global recognition, enabling the exchange of Border Gateway Protocol (BGP) routing information with other ...

B

Back-End Database

The back-end database is a crucial component of a database system, responsible for managing data, executing queries, and processing transactions. It serves as the backbone of data storage and ...

Backup & Recovery

The process of data backup involves copying and saving data at regular intervals, enabling restoration or recreation later in the event of a system failure, data deletion, or corruption. This process ...

Bandwidth

Bandwidth refers to the maximum data transfer rate of a network or internet connection, measuring the capacity of how much data can be sent over a specific connection in a given amount of time. It is ...

Bare-Metal Hypervisor

A bare-metal hypervisor operates directly on the physical hardware of a server, eliminating the need for a host operating system. This type of hypervisor offers high performance and efficiency, ...

BCM (Branch Circuit Monitoring)

Branch Circuit Monitoring systems measure and monitor the power usage of each customer in a data center. These devices are essential for ensuring the operational integrity of the power supply and ...

BMR

Biometric Readers, or Biometric Reading devices, are placed at access points in data centers to ensure secure entry. These devices use unique physiological characteristics, such as hand geometry, to ...

Brownfield

Brownfield development refers to the process of building on or redeveloping an existing property. This approach often involves repurposing or upgrading existing structures and infrastructure, as ...

Build-To-Suit

A build-to-suit data center facility is designed and developed with customer input to meet specific requirements, such as deployment size, power needs, security measures, and other unique ...

Building Management System (BMS)

A Building Management System (BMS) is an advanced electronic network used to monitor and control a building's electrical and mechanical services, including heating, ventilation, air conditioning ...

C

CaaS (Containers as a Service)

Container as a Service (CaaS) is a cloud computing service model that provides a platform for deploying, managing, and orchestrating containerized applications. CaaS abstracts the underlying ...

Cabinet

A cabinet in a data center context is similar to a server rack, but it typically includes doors at the front and rear, providing additional security and protection for the equipment housed within. ...

Cage

In a data center, a cage is an enclosure that subdivides colocation space using mesh walls, doors, and security panels. Similar to animal enclosures at a zoo, data center cages provide full ...

Capacity Planning

Capacity planning in data centers is a strategic process that involves assessing and forecasting future computing and storage needs. This process includes analyzing current usage patterns, predicting ...

Carrier Hotel

A carrier hotel, also known as a colocation center, is a secure physical site or building where multiple data communications networks converge and interconnect. This shared environment allows for ...

Carrier-neutral colocation

Carrier-neutral colocation facilities are multitenant, turnkey data centers that do not affiliate with a single network service provider. Instead, they aim to host as many providers as possible under ...

Chiller Plant

A chiller plant is a facility housing equipment, such as chillers and cooling towers, designed to regulate and maintain the temperature of water used in the cooling system of a data center. The ...

Ciphertext

Ciphertext is the encrypted output resulting from the application of an encryption algorithm to plaintext data. It is unreadable without the corresponding decryption key, serving as a means to ...

Cloud Computing

Cloud computing is a model for delivering and accessing computing resources over the internet. It includes services such as storage, processing power, and applications, providing users with on-demand ...

Cloud On-Ramp

A connection service within a data center provides direct connectivity to cloud providers, enabling seamless and secure integration of on-premises infrastructure with cloud-based services. This ...

Colocation

Colocation, or "colo," is the practice of housing privately owned servers and networking equipment in a third-party data center. Rather than maintaining servers within their own infrastructure, ...

Computer Room Air Conditioner (CRAC)

A Computer Room Air Conditioning (CRAC) unit is a specialized device that monitors and maintains the temperature, air distribution, and humidity in a network room or data center. These units are ...

Computer Room Air Handler (CRAH)

A Computer Room Air Handler (CRAH) utilizes fans and chilled water coils to remove heat from the data center. This system is designed to maintain precise temperature and humidity levels, ensuring the ...

Containerization

Containerization is a lightweight virtualization technique where applications and their dependencies are packaged into containers. This approach simplifies deployment, scaling, and management of ...

Containers

Containers were developed to address the challenge of ensuring applications run reliably when moved between different systems and computing environments, such as the cloud. Differences in supporting ...

Cooling Density

Cooling density in a data center context refers to the amount of cooling capacity available per unit of space, typically measured in watts per square foot or watts per square meter. It represents ...

Cooling System

Cooling technologies and mechanisms employed in data centers are essential for managing and regulating temperature and humidity levels. Effective cooling is crucial for preventing equipment ...

Cross-connect

In data centers, cross-connects are coaxial, fiber, or sometimes copper cables that directly connect customers' equipment to other customers' equipment. These point-to-point connections provide ...

Cryogenics Cooling

Cryogenic cooling in data centers is a method that utilizes extremely low temperatures, often involving liquid nitrogen or other cryogenic fluids, to dissipate heat from equipment. This advanced ...

Cryptographic Hash Function

Cryptographic hash functions are mathematical algorithms that generate a fixed-size string of characters, known as a hash value, from input data of any size. These functions are widely used for data ...

D

Data Center

Data centers are centralized facilities used for the storage, processing, management, and dissemination of data and information. They play a critical role in supporting the operations of various IT ...

Data Deduplication

Data deduplication is the process of identifying and eliminating duplicate copies of data within a storage system. This technique reduces storage space requirements, minimizes backup times, and ...

Data Encryption

Encryption is the process of converting plaintext data into ciphertext to secure it from unauthorized access or interception. This process is crucial for protecting sensitive information during ...

Data Hall

This secure area of a data center that houses the technical infrastructure is typically filled with server cabinets of various sizes and a cooling system. The data hall is the heart of the data ...

Data Residency

Data residency refers to the physical or geographic location where data is stored and processed. This consideration is crucial for compliance with data protection regulations and can impact the ...

DCIM (Data Center Infrastructural Management)

Data Center Infrastructure Management (DCIM) is the convergence of IT and building facilities within an organization. The goal of DCIM is to provide administrators with a holistic view of a data ...

Deep learning

Deep learning, a subset of machine learning, involves using large neural networks, enormous data sets, and powerful computers to tackle complex, real-time tasks. This advanced form of artificial ...

Digital Twin

Digital twins are virtual representations of physical objects, systems, or processes that mirror their real-world counterparts. In data centers, digital twins are used for simulation, monitoring, and ...

Disaster Recovery

Disaster recovery is the process of resuming normal operations following a disaster by regaining access to data, hardware, software, networking equipment, power, and connectivity. This process ...

Docker

Docker is a platform that enables developers to automate the deployment and scaling of applications using containers. Docker simplifies the packaging and distribution of software, enhancing ...

Downtime

Downtime refers to the period during which a system, service, or application is unavailable or not operational. It can result from planned maintenance, unexpected hardware failures, or other issues, ...

DRaaS (Disaster Recovery as a Service)

Disaster Recovery as a Service (DRaaS) provides continuous data protection from a primary environment to a target site. This service replicates data between different storage and server technologies, ...

E

Edge Data Center

Edge data centers are smaller facilities located close to the populations they serve, delivering cloud computing resources and cached content to end users. They typically connect to a larger central ...

Edge Router

An edge router is a networking device positioned at the edge of a network, connecting it to external networks, such as the internet. Edge routers manage data traffic between the internal network and ...

Elastic Computing

Elastic computing is a cloud computing feature that allows the automatic scaling of computing resources based on demand. This capability enables data centers to efficiently handle varying workloads, ...

F

Facility Management

Facility management in a data center context involves the comprehensive management of physical facilities, including building infrastructure, security, environmental controls, and maintenance. ...

Fault Tolerance

Fault-tolerant systems are designed to continue operating without disruption in the presence of hardware or software failures. These systems are engineered to maintain functionality and minimize ...

Fiber Channel

Fiber Channel is a high-speed networking technology primarily used for transmitting data between data storage and servers. It provides a reliable and scalable solution for storage area networks ...

Firmware

Firmware is software embedded in hardware devices, such as servers, networking equipment, or storage devices. It provides low-level control and functionality to the hardware, often responsible for ...

FLAP Market

The FLAP market, representing Frankfurt, London, Amsterdam, and Paris, comprises key European cities considered Tier 1 locations for data centers. These cities have a high concentration of data ...

Free cooling

Free cooling is a data center cooling method that uses ambient air or water to reduce the reliance on mechanical cooling systems. While not entirely free, this approach is more cost-effective than ...

Freedom Standard Design

Freedom Standard Design in data centers is a design philosophy focused on flexibility, scalability, and customization. This approach allows clients to tailor their data center infrastructure to meet ...

G

Green Data Center

A green data center is a facility designed and operated with a focus on energy efficiency and minimal environmental impact. These data centers incorporate advanced technologies and strategies, such ...

H

High Density

High-density data centers are characterized by power density (watts per square foot) that exceeds standard design parameters. These facilities are equipped to handle a greater amount of power in a ...

HVAC (Heating, Ventilation and Air Conditioning)

Heating, Ventilation, and Air Conditioning (HVAC) systems in a data center are responsible for managing the thermal environment, airflow, cooling, and humidity control. These systems are crucial for ...

Hybrid cloud

A hybrid cloud architecture combines private and public cloud environments, often for scalability and data delivery purposes. This blended approach allows organizations to leverage the security and ...

Hyperscale

Hyperscale computing refers to the infrastructure and provisioning required in distributed computing environments to efficiently scale from a few servers to thousands. This type of computing is ...

I

IaaS (Infrastructure as a Service)

Infrastructure as a Service (IaaS) is a service model that allows organizations to outsource the responsibility of purchasing and/or maintaining the equipment and software that comprise the ...

Internet exchange

An internet exchange point (IXP) is a physical site where telecom companies and internet service providers (ISPs) exchange internet traffic between their networks. IXPs serve as critical nodes in the ...

Intracampus cross-connect

Intracampus cross-connects in data centers effectively turn one facility into a village of interconnected data centers. These cross-connects enable seamless and high-speed connectivity between ...

K

Kernel

The kernel is the core computer program of an operating system (OS), with complete control over every function of the OS. In the context of containers, the kernel's role is significant because ...

L

Latency

Latency is the time delay between the initiation of a data transfer and the actual delivery of the data. Low latency is essential for real-time applications and services, such as online gaming, video ...

Latency Sensitivity

Latency sensitivity is a measure of how sensitive a particular application or workload is to network or processing delays. Latency-sensitive applications, such as real-time communication or financial ...

Lights-down mode

Lights-down mode in data centers refers to sections where customers' servers are colocated under low-light conditions. The purpose of this design is to enhance security and confidentiality by ...

Load Balancer

A load balancer acts as the "traffic cop" of the network world, distributing network and application traffic across multiple servers or networks. This distribution ensures that no single server or ...

Load Shedding

Load shedding is a strategy used in power management to selectively and temporarily reduce electrical load during periods of high demand or power supply constraints. This approach helps prevent ...

Logical Volume Manager (LVM)

Logical Volume Management (LVM) is a software tool that manages disk volumes in a flexible and dynamic manner. LVM allows for the creation, resizing, and movement of logical volumes, providing ...

Low Density

Low-density data centers are characterized by power density (watts per square foot) that falls below standard design parameters. These facilities are equipped to handle lower power requirements per ...

M

Machine learning

Machine learning uses algorithms to analyze data, draw conclusions, and make predictions or findings. This process involves enabling machines to learn and improve from experience without being ...

Mantrap

Mantraps are physical security features located at the entry points of secure facilities, designed to trap a person temporarily. These systems typically consist of a small vestibule with security ...

Media Converter

Media converters enable the connection of two dissimilar media types, such as fiber optic cabling and common copper-based cabling. These devices are essential for integrating different types of ...

Meet Me Room

A Meet Me Room (MMR) is a dedicated space inside a data center where internet service providers (ISPs), telecommunications carriers, cable companies, and other entities handling large volumes of ...

Memory Ballooning

Memory ballooning is a technique used in virtualization to optimize memory usage by dynamically adjusting the allocation of memory resources to virtual machines based on demand. This approach allows ...

Metro Connect

Metro Connect is a service in data centers offering high-speed connectivity between multiple facilities within the same metropolitan area. It enables seamless data transfer and interconnection across ...

Microsegmentation

Microsegmentation is a security strategy that divides a network into small, isolated segments to enhance security by limiting lateral movement for potential attackers. This approach is commonly used ...

Microservices

Microservices is an architectural approach where software applications are developed and deployed as a collection of small, independent, and loosely coupled services. This methodology enables ...

Modular Data Center

Modular data centers use pre-engineered modules or components for easy expansion and scalability. This design approach offers flexibility and rapid deployment, making modular data centers suitable ...

MPLS (Multiprotocol Label Switching)

Multiprotocol Label Switching (MPLS) is a protocol for efficiently directing data traffic within a telecommunications network. MPLS uses labels to route packets along predefined paths, improving ...

MSB

The Main Switch Board (MSB) in a data center directs and monitors electricity coming from the power grid. In the event of a voltage drop or power loss, the MSB automatically switches the load to ...

N

N+1 Redundancy

N+1 redundancy is a strategy that includes one additional (spare) component beyond what is required for normal operation. In a data center context, N+1 redundancy helps mitigate the impact of ...

Network Functions Virtualization (NFV)

Network Function Virtualization (NFV) involves replacing traditional network hardware functions with software running on virtualized commodity servers. This concept allows network operators to save ...

Network Redundancy

Network redundancy involves implementing multiple network paths and connections to ensure continuous data transmission in the event of a network failure. This approach enhances reliability and ...

Network service provider (NSP) colocation

NSP colocation facilities are closely aligned with a single network service provider, offering multitenant, turnkey data center services. While these facilities are still open to multiple tenants, ...

Neural networks

Neural networks are computational models patterned after the human brain's structure and function. They break down complex learning tasks into layers of interconnected nodes, each layer building upon ...

O

Open Compute Project (OCP)

The Open Compute Project (OCP) is an initiative promoting the development and sharing of open-source hardware designs for data center infrastructure. OCP aims to drive innovation, efficiency, and ...

Orchestration

Orchestration software simplifies and systematizes the deployment of containers to create desired sets of functions, including network routing and load balancing. This software automates the ...

Overhead cable tray system

Overhead cable trays in data centers are a cable management system superior to traditional raised floor systems. These trays, installed above the equipment, make cables easier to install, manage, and ...

P

PaaS (Platform as a Service)

Platform as a Service (PaaS) is a cloud computing layer that provides not only the hardware but also the software needed to create a complete computing platform. This service includes operating ...

PDU (Power Distribution Units)

Power Distribution Units (PDUs) in data centers distribute power to gear in cabinets and cages. PDUs play a crucial role in managing and delivering electrical power throughout the facility, ensuring ...

Persistent Storage

Persistent storage in data centers refers to storage solutions that retain data even when power is disconnected. This type of storage is crucial for preserving critical data and configurations, ...

POTS (Plain Old Teleophone Service)

POTS represents the traditional analog signal-based telephone service that dominated telecommunications before the advent of digital telephony. POTS relies on copper wire networks to transmit voice ...

Power Density

Power density is the amount of power used by a fully populated server rack. A high power density data center handles more power in the same space compared to a lower-density facility. This capability ...

Power Distribution

Power distribution in data centers involves the systematic delivery of electrical power to various devices and equipment. Power distribution systems include PDUs, electrical panels, and wiring ...

Power Usage Effectiveness (PUE)

Power Usage Effectiveness (PUE) is the standard measure of how efficiently a data center uses energy. It is a ratio comparing the power used by a data center's IT equipment to the total power ...

Private cloud

A private cloud is a cloud computing environment set up for use by a single organization. It can be owned and managed entirely by the organization itself or partially outsourced to a vendor. The ...

Public cloud

Public clouds are cloud computing environments available for use by multiple customers simultaneously. These multi-tenant platforms include popular services like AWS, Microsoft Azure, Salesforce.com, ...

Q

QoS (Quality of Service)

Quality of Service (QoS) is a set of networking techniques and policies used to prioritize and control the delivery of data traffic to meet specific service level agreements. QoS is essential for ...

R

Rack Cooling Index (RCI)

Rack Cooling Index (RCI) is a metric used to assess the effectiveness of cooling within server racks. It takes into account both temperature and airflow, providing a quantitative measure of how well ...

Rack Uptime

Rack uptime is the percentage of time that a server rack or data center facility is operational and available for use. It is a key metric in assessing the reliability and performance of data center ...

Radio Frequency Identification (RFID) tags

Radio-frequency identification (RFID) tags enable wireless communication between Internet of Things (IoT) objects, devices, and systems. They also make the objects they are attached to uniquely ...

Redundancy

Redundancy in data center infrastructure involves the inclusion of backup systems or components to ensure continuous operation in the event of hardware failures or other disruptions. Redundancy ...

Redundant Array of Inexpensive Disks (RAID)

RAID is a storage technology that combines multiple low-cost disk drives into an array to improve performance, reliability, or both. RAID configurations offer various levels of redundancy and fault ...

Retail data centers

Retail data centers, also known as multi-tenant data centers, house multiple companies simultaneously. Companies typically lease space for IT equipment in flexible increments, such as by the rack or ...

S

Server Rack

Server racks are metal frames designed to hold and organize servers within a data center. They provide a structured way to mount and secure servers, facilitating efficient cooling and cable ...

Server Virtualization

Server virtualization involves the creation of multiple virtual instances or servers on a single physical server. This technology allows for efficient resource utilization, scalability, and the ...

Shell data center

A shell data center is a building pre-qualified for data center development, providing the basic infrastructure necessary for operation. This type of facility typically has access to power and ...

Software-Defined Networking (SDN)

Software-Defined Networking (SDN) is a network architecture that separates the control plane from the data plane, allowing administrators to manage network resources programmatically. SDN enhances ...

Structured Data

Structured data is organized and formatted according to a predefined data model or schema, making it easily queryable and typically stored in relational databases. This type of data includes fields ...

Structured Query Language (SQL)

SQL (Structured Query Language) is a domain-specific language used for managing and manipulating relational databases. SQL enables users to query databases, insert, update, and delete data, and ...

Suite

Data center suites are hard-walled rooms designed for colocation customers requiring more space. These suites bridge the gap between wholesale and retail colocation, offering larger square footage, ...

U

Unstructured Data

Unstructured data does not follow a predefined data model or fit into relational databases. Examples include video, text of email messages, and social media content. This type of data makes up the ...

UPS (Uninterruptible Power Supply)

An Uninterruptible Power Supply (UPS) is a power backup system that provides emergency power to critical equipment in case of electrical failures. UPS systems prevent data loss and downtime by ...

Uptime

Uptime, in the context of data centers, refers to the times when servers are operational and running. It is a critical industry metric of reliability, indicating the availability and dependability of ...

V

Variable frequency drives (VFD)

A Variable Frequency Drive (VFD) is a device that allows data center operators to vary both the frequency and the voltage supplied to a motor. This capability enables precise control over motor speed ...

VESDA (Very Early Smoke Detection Apparatus)

Very Early Smoke Detection Apparatus (VESDA) systems are advanced fire detection solutions designed to identify potential fires in data centers before they can spread. VESDA systems feature pipes ...

Virtualization

Virtualization is the process of creating virtual representations of physical resources, such as servers, storage, or networks. This technology allows for efficient resource utilization, scalability, ...

VLAN (Virtual Local Area Network)

Virtual Local Area Networks (VLANs) are a network segmentation technique that allows multiple virtual networks to coexist on the same physical network infrastructure. VLANs enhance network security, ...

VRF (Virtual Routing and Forwarding)

Virtual Routing and Forwarding (VRF) is a technology that enables the creation of multiple virtual routing instances within a network. VRF allows for the segmentation and isolation of network ...

W

Wholesale data center

Wholesale data centers require a significant commitment from clients, typically involving leasing space that draws 300 kilowatts of power or more. These facilities are designed for clients with ...

Wide Area Network (WAN)

A Wide Area Network (WAN) is a network that spans large geographical areas, transmitting data among employees, customers, and partners in different locations. WANs consist of leased ...

Z

Zero Trust Security Model

Zero Trust is a security approach that assumes no entityÑwhether inside or outside the networkÑshould be trusted by default. This model requires verification of every user, device, or application ...

Zero-Day Vulnerability

Zero-day vulnerabilities are security flaws in software or hardware that are exploited by attackers before the vendor releases a fix or patch. These vulnerabilities pose significant risks to data ...

Zero-Trust Architecture

Zero-trust architecture is an IT security model that assumes no trust between users, devices, or systems, even if they are inside the network perimeter. This model requires continuous authentication ...

H

Hot/cold aisles

In a data center, the hot aisle/cold aisle configuration involves aligning server racks in alternating rows with the front sides (cold aisles) facing each other and the back sides (hot aisles) facing ...