-
21 WinSock direct
"A common programming interface to the lower-level system area network (SAN) implementations, developed by Microsoft. WSD sits underneath the standard WinSock application programming interface (API), but bypasses the kernel networking layers to talk directly to the SAN hardware. Because WSD sits underneath the existing WinSock API, IT departments can deploy applications in a SAN environment without modifying the applications." -
22 WSD
"A common programming interface to the lower-level system area network (SAN) implementations, developed by Microsoft. WSD sits underneath the standard WinSock application programming interface (API), but bypasses the kernel networking layers to talk directly to the SAN hardware. Because WSD sits underneath the existing WinSock API, IT departments can deploy applications in a SAN environment without modifying the applications." -
23 RSS Platform Sync Engine
"A synchronization engine which will automatically download data and enclosures for use by any application. The engine is designed for efficiency, using idle network bandwidth whenever possible to limit the effect on the users Internet experience. Developers can use the platform to get RSS data without having to manage details such as synchronization schedules or subscriptions." -
24 install point
A folder on a network or a location that is available to client computers for the installation of a program or application. -
25 load test scenario
"A scenario used to model how a group of users interacts with a server application. A scenario consists of a test mix, a load profile, a network mix, and a browser mix. A load test can have more than one scenario." -
26 data tier
"A layer that is part of a three-tier server software architecture that stores and persists data. Each logical server machine group contains an interface tier (a perimeter network), an application tier, and a data tier. This architecture provides high levels of scalability." -
27 fuzzing
A testing process that supplies structured but invalid input to software application programming interfaces (APIs) and network interfaces to maximize the likelihood of detecting errors that might lead to software vulnerabilities. -
28 distributed routing table
A routing table with entries that are distributed across a group of machines that can be used to map numeric keys to application endpoints and find routes through the network of peers. -
29 DRT
A routing table with entries that are distributed across a group of machines that can be used to map numeric keys to application endpoints and find routes through the network of peers. -
30 DRT API
The Application Programming Interface (API) that allows applications to publish and resolve numeric keys in a peer network. -
31 DRT mesh
"A group of computer systems sharing a cache of routing information, and a network protocol that is used to map numeric keys to application endpoints and find routes through the mesh. Each node in a route has an ID numerically closer to the target than its predecessor." -
32 claims-based identity
"A unique identifier that represents a specific user, application, computer, or other entity, enabling it to gain access to multiple resources, such as applications and network resources, without entering credentials multiple times. It also enables resources to validate requests from an entity."
- 1
- 2
См. также в других словарях:
Scalable Network Application Package — (SNAP) or SNAP Mobile is an online gaming platform from Nokia. It is intended for use for Java multiplayer online games. It consists of SNAP Mobile API for the client and it uses HTTP or TCP to connect to the SNAP Mobile gateway.This gaming… … Wikipedia
Network Application Support — A Digital product which simplifies the integration of applications and systems running on VMS mainframe computers. See also Digital … International financial encyclopaedia
Application performance management — Application Performance Management, or APM, refers to the discipline within systems management that focuses on monitoring and managing the performance and service availability of software applications.APM can be defined as process and use of… … Wikipedia
Network neutrality (disambiguation) — Network neutrality refers to one or more of the following:# Network stratification the political debate about the future usage of the Internet. # The satisfaction of all network application needs fairly. Any particular internet host, protocol, or … Wikipedia
Application layer — The Internet protocol suite (TCP/IP) and the Open Systems Interconnection model (OSI model) of computer networking each specify a group of protocols and methods identified by the name application layer. In TCP/IP, the application layer contains… … Wikipedia
Application object — In Novell Directory Services (NDS), a leaf object that represents a network application in a NetWare Directory tree. See also Computer object; container object; leaf object; Novell Directory Services … Dictionary of networking
Network architecture — is the design of a communications network. It is a framework for the specification of a network s physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in… … Wikipedia
Network neutrality in the United States — Network Neutrality Related issues and topics Automatic telephone exchange Data discrimination End to end principle Internet Protocol Tiered Internet Bandwidth Throttling … Wikipedia
Application security — encompasses measures taken throughout the life cycle to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, deployment, upgradation,or maintenance of the … Wikipedia
Network transparency — in its most general sense refers to the ability of a protocol to transmit data over the network in a manner which is transparent (invisible) to those using the applications that are using the protocol. The term is often applied in the context of… … Wikipedia
Network calculus — is a theoretical framework for analysing performance guarantees in computer networks. As traffic flows through a network it is subject to constraints imposed by the system components, for example: link capacity traffic shapers (leaky buckets)… … Wikipedia