Municipal broadband

Municipal broadband is a type of broadband internet access that is provided by a municipality, typically through a government-owned utility or a public-private partnership. Municipal broadband can be deployed in a variety of ways, including fiber-to-the-home (FTTH), wireless, and cable. In the United States, there are over 500 communities that have deployed some form of … Read more

Cloud service latency

Cloud service latency is the time it takes for a cloud service to respond to a request. It is typically measured in milliseconds. Cloud service providers strive to minimize latency to improve the user experience. What is latency in Web services? There are a few different types of latency that can occur in web services: … Read more

Superuser

A superuser is a user who has been given elevated privileges within a computer system. In many cases, a superuser is given these privileges so that they can perform system-wide tasks, such as installing new software or managing system settings. In some cases, a superuser may also be given the ability to elevate the privileges … Read more

Path Computation Element Protocol (PCEP)

PCEP is a network protocol used to compute paths across a network. It is typically used in conjunction with a routing protocol such as OSPF or IS-IS to compute paths that satisfy certain constraints, such as minimizing cost or maximizing throughput. PCEP is based on the Path Computation Element (PCE) architecture, which defines a distributed … Read more

Network intrusion protection system (NIPS)

A network intrusion protection system (NIPS) is a network security system that monitors network traffic for malicious activity and can take action to block or terminate suspicious traffic. NIPS systems are typically deployed at strategic points in a network, such as at internet gateways or between internal networks and DMZs. NIPS systems work by analyzing … Read more

Wireshark

Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues. Wireshark uses the pcap library to capture packets and the Qt widget toolkit for its user interface. It … Read more

Incident

An incident is an unplanned interruption to an IT service or reduction in the quality of an IT service. An incident may be caused by a single event or by a number of events that have the same root cause. The term “incident” is often used interchangeably with “outage.” What is another word for incident? … Read more

Intent-based networking (IBN)

Intent-based networking (IBN) is a network management methodology that uses a declarative approach to describe what the network should do, rather than how it should do it. In an IBN system, network administrators specify the desired outcomes or “intents” for the network, and the system then automatically configures the network to meet those intents. The … Read more

Server farm (Web farm, Web server farm)

A server farm (also known as a web farm or web server farm) is a collection of computer servers that are used to store, process and deliver data, content or applications. The term can also refer to the physical grouping of servers in a data center. A server farm may be used to provide the … Read more

Bandwidth test (testing your bandwidth)

A bandwidth test is a test that measures the amount of data that can be transferred between two points in a given period of time. This is usually done by measuring the time it takes to transfer a certain amount of data from one point to another. What is bandwidth testing? Bandwidth testing is the … Read more