-
1 network logon
"The process of logging on to a computer by means of a network. Typically, a user first interactively logs on to a local computer, then provides logon credentials to another computer on the network, such as a server, that he or she is authorized to use." -
2 network address translation
An Internet Protocol (IP) translation process that allows a network with private addresses to access information on the Internet.English-Arabic terms dictionary > network address translation
-
3 operations network
"An organization of operations that synchronizes the dependencies between operations based on starting/ending times, costs, and other criteria. The organization forms a network that follows the manufacturing process from beginning to end. The three types of networks are simple network, simultaneous operations network, and complex network." -
4 load balancing
"In client/server network administration, the process of reducing heavy traffic flows either by dividing a busy network segment into multiple smaller segments or by using software to distribute traffic among multiple network interface cards working simultaneously to transfer information to a server." -
5 username
"The name by which a user is identified to a computer system or network. During the logon process, the user must enter the username and the correct password. If the system or network is connected to the Internet, the username generally corresponds to the leftmost part of the user's e-mail address (the portion preceding the \@ sign, as in username\@company.com)." -
6 denial-of-service attack
"An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system." -
7 denial of service attack
"An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system." -
8 DoS
"An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system." -
9 bandwidth throttling
"The process of setting the maximum portion of total network capacity that a service is allowed to use. An administrator can deliberately limit a servers Internet workload by not allowing it to receive requests at full capacity, thus saving resources for other programs, such as e-mail." -
10 binding
"A process by which software components and layers are linked together. When a network component is installed, the binding relationships and dependencies for the components are established. Binding allows components to communicate with each other." -
11 capacity planning
"The process of identifying and preparing for the application, hardware, and network requirements to support expected site traffic and achieve site performance goals." -
12 file transfer
"The process of moving or transmitting a file from one location to another, as between two programs or over a network." -
13 logging
"The process of recording actions that take place on a computer, network, or system." -
14 NAT
An Internet Protocol (IP) translation process that allows a network with private addresses to access information on the Internet. -
15 pull
The process of retrieving data from a network server. -
16 resource
"Generally, any part of a computer system or network, such as a disk drive, printer, or memory, that can be allotted to a running program or a process." -
17 upload
"In communications, the process of transferring a copy of a file from a local computer to a remote computer by means of a modem or network." -
18 NetBIOS name
"A 16-byte name of a process using network basic input/output system (NetBIOS). The NetBIOS name is a name that is recognized by WINS, which maps the name to an IP address." -
19 fuzzing
A testing process that supplies structured but invalid input to software application programming interfaces (APIs) and network interfaces to maximize the likelihood of detecting errors that might lead to software vulnerabilities. -
20 least-cost routing
A process that performs reverse number lookup on one-number calls and then routes the call over an IP connection to the public switched telephone network (PSTN) gateway that is nearest to the location of the destination phone number.
- 1
- 2
См. также в других словарях:
Object Process Network — [http://opn.mit.edu/ Object Process Network] (OPN) [B. H. Y. Koo. A Meta language for Systems Architecting . PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, 2005. [http://opn.mit.edu/images/Submitted Thesis BKOO.pdf PDF File] ]… … Wikipedia
Business Process Network — Business process networks (BPN), also referred to as business service networks or business process hubs, enable the efficient execution of multi enterprise operational processes, including supply chain planning and execution.To execute such… … Wikipedia
Network planning and design — is an iterative process, encompassing topological design, network synthesis, and network realization, and is aimed at ensuring that a new network or service meets the needs of the subscriber and operator.[1] The process can be tailored according… … Wikipedia
Process architecture — is the structural design of general process systems and applies to fields such as computers (software, hardware, networks, etc.), business processes (enterprise architecture, policy and procedures, logistics, project management, etc.), and any… … Wikipedia
Network-Centric Service-Oriented Enterprise (NCSOE) — is a new generation enterprise capable of conducting collaboration and management of internal and external information. Using Network Centric Enterprise Services (NCES) , the enterprise can now enforce information and decision superiority in a… … Wikipedia
Network traffic simulation — is a process used in telecommunications engineering to measure the efficiency of a communications network. Contents 1 Overview 2 Simulation methods 3 Advantages of simulation 4 … Wikipedia
Network booting — is the process of booting a computer from a network rather than a local drive. This method of booting can be used by routers, diskless workstations and centrally managed computers (thin clients) such as public computers at libraries and schools.… … Wikipedia
Network Agility — is an architectural discipline for computer networking. It can be defined as: The ability of network software and hardware to automatically control and configure itself and other network assets across any number of devices on a network. With… … Wikipedia
Network synthesis filters — Network synthesis is a method of designing signal processing filters. It has produced several important classes of filter including the Butterworth filter, the Chebyshev filter and the Elliptic filter. It was originally intended to be applied to… … Wikipedia
Network switching subsystem — (NSS) (or GSM core network) is the component of a GSM system that carries out call switching and mobility management functions for mobile phones roaming on the network of base stations. It is owned and deployed by mobile phone operators and… … Wikipedia
Network Rail Route Utilisation Strategies — Network Rail has an obligation, transferred from the abolished Strategic Rail Authority, to produce Route Utilisation Strategies [http://www.networkrail.co.uk/browseDirectory.aspx?root= pageid=2895 dir=RUS%20DocumentsRoute%20Utilisation%20Strategi… … Wikipedia