Backup Software-Software that allows copying files or databases so that they will be preserved in case of equipment failure or other catastrophe.
can you find an example of a brand name with specific features it offers? -Justin Scott 6/1/09 9:18 AM
Broadband Wireless Access-Wireless Broadband is a fairly new technology that provides high-speed wireless internet and data network access over a wide area. how wide of an area? -Justin Scott 6/1/09 9:19 AM
Client/server network-A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server. Compare peer-to-peer network.
CT scanner (CAT Scan)- Tomography (a method of producing a three-dimensional image of the internal structures of a solid object (as the human body or the earth) by the observation and recording of the differences in the effects on the passage of waves of energy impinging on those structures) in which computer analysis of a series of cross-sectional scans made along a single axis of a bodily structure or tissue is used to construct a three-dimensional image of that structure. The technique is used in diagnostic studies of internal bodily structures, as in the detection of tumors or brain aneurysms.
-A machine does imaging of you body to look for growths and other things that shouldn't be there.
Data redundancy- The occurrence of values for data elements more than once within a file or database. (this is bad because: One of the biggest disadvantages of data redundancy is that it increases the size of the database unnecessarily. Also data redundancy might cause the same result to be returned as multiple search results when searching the database causing confusion and clutter in results.)
Disaster recovery-Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster.Disaster recovery planning is a subset of a larger process known as business continuity planning and should include planning for resumption of applications, data, hardware, communications (such as networking) and other IT infrastructure. A business continuity plan (BCP) includes planning for non-IT related aspects such as key personnel, facilities, crisis communication and reputation protection, and should refer to the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity. This article focuses on disaster recovery planning as related to IT infrastructure.
Embedded IT systems-Any electronic system that uses a computer chip, but that is not a general-purpose workstation, desktop or laptop computer. Such systems use microcontrollers (MCUs) or microprocessors (MPUs), or they may use custom-designed chips. Deployed by the billions each year in myriad applications, the embedded systems market uses the lion's share of all the electronic components in the world.Embedded systems are employed in automobiles, planes, trains, space vehicles, machine tools, cameras, consumer electronics, office appliances, network appliances, video games, cellphones, PDAs, GPS navigation as well as robots and toys. Low-cost consumer products can use microcontroller chips that cost less than a dollar. See microprocessor and microcontroller.
EMR- Electronic Medical Records-An electronic medical record (EMR) is a medical record in digital format. In health informatics and most contexts, EMR and EHR (electronic health records) are used synonymously, but many people define an EMR as just the physician interface and EHR including both a physician and patient interface. The term has sometimes included other systems which keep track of medical information, such as the practice management system which supports the electronic medical record.
Failover systems-Failover is the capability to switch over automatically to a redundant or standby computer server, system, or network upon the failure or abnormal termination of the previously active server, system, or network. Failover happens without human intervention and generally without warning, unlike switchover.Systems designers usually provide failover capability in servers, systems or networks requiring continuous availability and a high degree of reliability.
File server-In the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. Any computer can be configured to be a host and act as a file server. In its simplest form, a file server may be an ordinary PC that handles requests for files and sends them over the network. In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers, allowing anyone on the network to store files on it as if to their own hard drive.
A program or mechanism that enables the required processes for file sharing can also be called a file server. On the Internet, such programs often use the File Transfer Protocol (FTP).
Fire wall-computer hardware or software that prevents unauthorized access to private data (as on a company's local area network or intranet) by outside computer users (as of the Internet)
Internet-an electronic communications network that connects computer networks and organizational computer facilities around the world
Intranet-a network operating like the World Wide Web but having access restricted to a limited group of authorized users (as employees of a company)
LAN hardware and software- A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office or building.
Network server- A computer system that serves as a central repository of data and programs shared by users in a network.
Peer-to-peer network- A network of personal computers, each of which acts as both client and sever, so that each can exchange files and email directly with every other computer on the network
Security software and hardware-
Software- McAfee
Hardware- Biometrics
Server-a computer in a network that is used to provide services (as access to files or shared peripherals or the routing of e-mail) to other computers in the network
VPN- Virtual Private Network- A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost.
WiFi- The term Wi-Fi is often used by the public as a synonym for wireless LAN (WLAN); but not every wireless LAN product has a Wi-Fi certification, which may be because of certification costs that must be paid for each certified device type.
Wi-Fi is supported by most personal computer operating systems, many game consoles, laptops, smartphones, printers, and other peripherals.