DAC |
1. [Data Security] Acronym for Discretionary Access Control. 2. [Hardware] Acronym for Digital Analog Converter. |
daemon |
A long running process on a computer system that services a particular type of request. |
DAS |
Acronym for Direct Attached Storage. |
data |
The digital representation of anything in any form. |
data at rest |
Data stored on stable non-volatile storage. [ISO/IEC 27040]. |
data authentication |
The process of substantiating that the data is an accurate representation of what it purports to be. [SWGDE/ SWGIT Glossary] |
data availability |
The amount of time that data is accessible by applications during those time periods when it is expected to be available, often expressed as a percentage. |
data breach |
A compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected data transmitted, stored or otherwise processed. [ISO/IEC 27040] |
Data Center Bridging |
The suite of Ethernet protocol extensions defined for reliable storage transports such as FCoE. DCB includes the following protocols: IEEE 802.1Qau (CN), IEEE 802.1Qaz (ETS and DCBX), and IEEE 802.1Qbb (PFC). A data center bridge implements the above protocols and capabilities for use in the data center. |
Data Center Bridging eXchange protocol |
A DCB component for discovery and exchange of DCB information. |
data character |
Any transmission character associated by the transmission code with a valid data byte. |
data classification |
An organization of data into sets for management purposes. A frequent purpose of a classification scheme is to associate service level objectives with sets of data based on their value to the business. |
data compression |
The process of encoding data to reduce its size. Lossy compression (i.e., compression using a technique in which a portion of the original information is lost) is acceptable for some forms of data (e.g., digital images) in some applications, but for most IT applications, lossless compression (i.e., compression using a technique that preserves the entire content of the original data, and from which the original data can be reconstructed exactly) is required. |
data deduplication |
The replacement of multiple copies of data, at variable levels of granularity, with references to a shared copy in order to save storage space and/or data transferred. See also inline data deduplication, post-process data deduplication. |
data deduplication ratio |
A space reduction ratio that includes only the space reduction effects of data deduplication. |
data frame |
|
data in flight |
Synonym for data in motion. |
data in motion |
Data being transferred from one location to another [ISO/IEC 27040:2015]. Those transfers typically involve interfaces that are externally accessible and do not include internal transfers (i.e., never exposed to outside of an interface, chip, or device). |
data in transit |
1.[Data Security] Synonym for data in motion. 2.[Legal] Data in motion across a jurisdictional boundary. Jurisdictions (usually nation states) may have policies and enforcement points that determine whether data may cross their borders. |
data in use |
Data in the process of being created, retrieved, manipulated, updated, or deleted. |
data ingestion |
A process for depositing data into a system. |
data integrity |
|
data lake |
A large repository for storing data in an unstructured way, in anticipation of future analytics. This term originated in the big data community. |
Data Lifecycle Management |
The policies, processes, practices, services and tools used to align the business value of data with the most appropriate and cost-effective storage infrastructure from the time data is created through its final disposition. Data is aligned with business requirements through management policies and service levels associated with performance, availability, recoverability, cost, etc. DLM is a subset of ILM. |
data management |
The discipline and function of oversight and control of data. |
data management services |
A set of services that control data from the time it is created until it no longer exists. Data Management services are not in the data path; rather, they provide control or utilize data in the delivery of their services. This includes services such as data movement, data redundancy, and data deletion. Some data management services are managed using the control plane. |
data manager |
A function that presents a view of data to applications, and maps that view to an internal representation on a system, subsystem or device. File systems and database management systems are examples of data managers. |
data plane |
The portion of a system that moves user data. In a storage system the data plane is responsible for storing and retrieving data. Also see control plane. |
data portability |
The ability to transfer data with its metadata from one system to another system that preserves meaning. |
data preservation |
The processes of ensuring data integrity, continued existence, and usability of stored data over a period of time. |
data processing unit |
An accelerator element capable of parsing, processing, and transferring data with performance efficiency.A data processing unit (DPU) usually has a set of programmable acceleration engines that offload and improve performance for applications such as AI/ML, security, telecommunications, or storage. DPUs may also be called SmartNICs, IPUs or NAPUs. |
data protection |
The combination of data integrity, data availability, and confidentiality. |
data reliability |
The length of the statistically expected continuous span of time over which data stored by a population of identical storage subsystems can be correctly retrieved, expressed as Mean Time to Data Loss (MTDL). |
data replication |
Continuously maintaining a copy of data–possibly at a remote site–from a volume to provide high availability and redundancy. Data replication may be used for disaster recovery and business continuance. |
data repository |
Implementation of a collection of data along with data access and control mechanisms, such as search, indexing, storage, retrieval and security. [ISO/IEC 20944-1:2013] EXAMPLE: A repository might support services such as search, indexing, storage, retrieval and security. |
data resource domain |
The category of resources that exclusively encompass data management services. |
data retention |
Preserving the existence and integrity of data for some period of time or until certain events have transpired. |
data service |
A set of functions that process data without interpretation. This processing may involve copying, movement, security and/or protection, but not the actual storage of the data. |
data shredding |
A process for deleting data that is intended to make the data unrecoverable. One such process consists of repeated overwrites of data on the storage media. Data shredding is not generally held to make data completely unrecoverable in the face of modern forensic techniques–that requires physical destruction of the storage media. Forensic techniques, however, do require physical access to the storage media. |
Data Storage as a Service |
Typically, Data Storage as a Service (DSaaS) hides limits to scalability, is either self-provisioned or provisionless and is billed based on consumption. |
data striping |
A disk array data mapping technique in which fixed-length sequences of virtual disk data addresses are mapped to sequences of member disk addresses in a regular rotating pattern. Data stripping is commonly used in RAID implementations. |
data transfer capacity |
The maximum rate at which data can be transmitted. See data transfer rate. |
data transfer device |
A removable media storage device in a library. Examples are magnetic disk drives, cartridge tape drives, optical disk drives, and CD-ROM drives. |
data transfer rate |
The amount of data per unit time actually moved across an interconnect. |
Database Management System |
A database management system (DBMS) removes the need for a user or program to manage low level database storage. It also provides security for and assures the integrity of the data it contains. Types of database management systems are relational (table-oriented), network, hierarchical and object oriented. |
datagram |
A message sent between two communicating entities for which no explicit acknowledgement is expected. Datagrams are often said to be sent on a best effort basis. |
DBMS |
Abbreviation for Database Management System. |
DCB |
Acronym for Data Center Bridging. |
DDR / DDR2 / DDR3 / DDR4 / DDR5 |
Acronym for Double Data Rate. The number after the DDR term designates the generation of the memory (e.g., DDR4 is the fourth generation of a DDR bus). |
decoding |
Conversion of received transmission characters to valid data bytes and special codes. |
decryption |
Conversion of encrypted information to plaintext based on the algorithm and key(s) used to encrypt it. |
dedicated connection |
A communication circuit between two N-Ports maintained by a Fibre Channel fabric. The port resources used by a dedicated connection cannot be used for other purposes during the life of the dedicated connection. |
deduplication |
See data deduplication. |
defense-in-depth |
An information assurance strategy integrating people, technology, and operations capabilities to establish multiple security barriers across layers and dimensions of a protected system. [NIST SP 800-53] |
degaussing |
1. A procedure that renders data unreadable by applying a strong magnetic field to the media. 2. Applying a degaussing procedure. Degaussing is also called demagnetizing and erasure. Both of these terms are misleading, because in magnetic digital media the individual magnetic domains are not erased or demagnetized, but simply made to line up in the same direction, which eliminates any previous digital structure. |
degraded mode |
|
delimiter |
An ordered set used to indicate a frame boundary. |
delta snapshot |
A type of point in time copy that preserves the state of data at an instant in time by storing only those blocks that are different from an already existing full copy of the data. |
delta-based data deduplication |
A method of performing data deduplication by storing or transmitting data in the form of differences from a baseline point in time copy. |
DEN |
Acronym for Directory Enabled Network. |
Denial of Service |
Prevention of authorized access to a system resource or the delaying of system operations and functions, with resultant loss of availability to authorized users. [ISO/IEC 27033-1:2015] |
destination identifier |
An address contained in a Fibre Channel frame that identifies the destination of the frame. |
destination Nx_Port |
|
device |
Synonym for storage device. |
device bus |
Synonyms for I/O interconnect. |
device channel |
A channel used to connect storage devices to a host bus adapter or an intelligent controller. The preferred term is I/O interconnect. |
device fanout |
Synonym for fanout. |
device I/O bus |
Synonyms for I/O interconnect. |
DF_ID |
Acronym for destination Fabric_Identifier. |
DH-CHAP |
Acronym for Diffie-Hellman augmented Challenge Handshake Authentication Protocol. |
DHCP |
Acronym for Dynamic Host Control Protocol. |
differential |
A SCSI electrical signaling technique in which each control and data signal is represented by a voltage differential between two signal lines. Differential signaling can be used over longer distances than the alternative single ended signaling. See single ended (signaling). |
differential incremental backup |
A backup in which data objects modified since the last full backup or incremental backup are copied. To restore data when differential incremental backups are in use, the newest full backup and all differential backups newer than the newest full backup are required. See cumulative incremental backup, full backup. |
differential signaling |
An electrical signaling technique in which each logical signal is represented by a voltage differential between two signal lines. Differential signaling can be used over longer distances than the alternative single ended signaling. |
Differentiated Services |
A protocol defined by the IETF for managing network traffic based on the type of packet or message being transmitted. The Differentiated Services protocol is often abbreviated as DiffServ. DiffServ rules define how a packet flows through a network based on a 6 bit field (the Differentiated Services Code Point) in the IP header. The Differentiated Services Code Point specifies the "per hop behavior" for the packet or message. |
Diffie-Hellman |
A key agreement protocol that was developed by W. Diffie and M. E. Hellman in allowing two entities to exchange a secret key over an insecure medium without any prior secrets. |
Diffie-Hellman augmented Challenge Handshake Authentication Protocol |
A password based Authentication and key management protocol that uses the CHAP algorithm (RFC 1994) augmented with an optional Diffie-Hellman algorithm. DH-CHAP provides bidirectional and may provide unidirectional Authentication between a Fibre Channel Initiator and Responder. DH-CHAP is defined by Fibre Channel – Security Protocols - 2 (FC-SP-2). |
DiffServ |
Abbreviation for Differentiated Services. |
digest |
A binary string of some fixed length derived by a computationally efficient function from a binary input string of arbitrary length. A key feature of cryptographic digests is that given a digest, it is computationally infeasible to find another plaintext string that generates the same digest. |
Digital Analog Converter |
A device that converts a discretely valued (digital) input to a continuously valued (analog) output. |
digital archive |
A storage repository or service used to secure, retain, and protect digital information and data for periods of time less than that of long-term data retention. A digital archive can be an infrastructure component of a complete digital preservation service, but is not sufficient by itself to accomplish digital preservation, i.e., long-term data retention. |
digital forensics |
The identification, collection, preservation and analysis of digital evidence for use in legal proceedings. |
Digital Linear Tape |
A family of tape device and media technologies. |
digital object auditing |
A methodology to verify and detect threats to the validity of digital preservation objects. Digital object auditing is a process of routine periodic testing of stored digital objects, usually using cryptographic techniques, by comparing their previous signatures and time stamps to their current to verify that change, loss of access, or data loss has not occurred. |
digital preservation |
Ensuring continued access to, and usability of, digital information and records, especially over long periods of time. |
digital preservation object |
A collection of data, metadata and possibly other resources treated as a unit for digital preservation purposes. A preservation object provides the functionality required to assure the future ability to use, secure, interpret, and verify authenticity of the metadata, information, and data in the container and is the foundational element for digital preservation of information and data. |
digital preservation service |
A service providing digital preservation. A digital preservation service includes a comprehensive management and curation function that controls its supporting infrastructure, information, data, and storage services in accordance with the requirements of the information objects it manages to accomplish the goals of digital preservation. |
digital signature |
A cryptographically derived binary string used to assure information authenticity, integrity, and nonrepudiation. Digital signatures can generally be externally verified by entities not in possession of the key used to sign the information. For example, a secure hash of the information encrypted with the originator's private key when an asymmetric cryptosystem is used. Some algorithms that are used in digital signatures cannot be used to encrypt data. (e.g., DSA). |
Digital Signature Algorithm |
A subset of the Digital Signature Standard that represents a specific public key algorithm that is only used for digital signatures. The secret key used in DSA operates on the message hash generated by SHA-1; to verify a signature, one recomputes the hash of the message, uses the public key to decrypt the signature and then compares the results. This algorithm is obsolete. |
Digital Signature Standard |
A standard for digital signature that is published by the National Institute of Standards and Technology (NIST) in Federal Information Processing Standard (FIPS) Publication 186-4. DSS specifies DSA as the algorithm for digital signatures and SHA-x for hashing. |
DIMM |
Acronym for Dual Inline Memory Module. |
Direct Attached Storage |
A storage device locally connected to a server and dedicated to that server. |
direct connected storage |
Synonym of direct attach storage. |
direct memory access |
The ability for an entity to access memory without processing CPU instructions. |
direct routing method |
A method used by expanders to route connection requests to devices directly attached to that expander, including other expanders. |
directory |
Microsoft's Active Directory (AD) and Novell's NetWare Directory Service (NDS) are examples of enterprise-wide LDAP directories. |
directory tree |
A collective term for a directory, all of its files, and each of its subdirectories. |
Disaster Recovery |
The recovery of data, access to data and associated processing after a loss of use of all or part of a data center. This involves not only an essential set of data but also an essential set of all the hardware and software to continue processing of that data and business. Any disaster recovery may involve some amount of down time. |
discard policy |
An error handling policy that allows an N_Port or NL_Port to discard data frames received following detection of a missing frame in a Sequence. |
disconnection |
The process of removing a dedicated connection between two N_Ports. |
discovery |
|
Discretionary Access Control |
A type of access control that allows a principal owning an object to grant or deny access to other principals. |
disk |
Synonym for disk drive. |
disk array |
A set of disks from one or more commonly accessible disk subsystems, combined with a body of control software. The control software presents the disks' storage capacity to hosts as one or more virtual disks. Control software is often called firmware or microcode when it runs in a disk controller. Control software that runs in a host computer is usually called a volume manager. |
disk cache |
The primary purpose of a disk cache is to improve disk or disk array I/O performance. See controller cache, host cache. |
disk drive |
A non-volatile, randomly addressable, re-writable data storage device made up of one or more rotating platters. This definition includes rotating magnetic and optical disks. |
disk image backup |
A backup consisting of a copy of each of the blocks comprising the usable storage area of a storage device. |
disk striping |
Deprecated synonym for data striping. |
disk subsystem |
A storage subsystem that supports only disks. |
disparity |
For a data stream using 8B/10B encoding, the difference between the number of ones and the number of zeros in a transmission character. |
disposition |
Range of processes associated with implementing records retention, destruction or transfer decisions that are documented in disposition authorities or other instruments. |
disposition policy |
A policy that defines when lifecycle deletion should occur, and/or what actions to perform. |
Distributed FCF |
Synonym for Distributed Switch. |
Distributed Switch |
A set of FCDFs associated with at least one Controlling Switch that controls the operations of the set of FCDFs. |
DLM |
Acronym for Data Lifecycle Management. |
DLT |
Acronym for Digital Linear Tape. |
DMA |
Shorthand for direct memory access. |
DMTF |
An industry organization that develops management standards for computer system and enterprise environments. DMTF standards include CIM and Redfish. The DMTF web site is www.dmtf.org. |
DNS |
Acronym for Domain Name Service. |
Document Type Definition |
In XML, a specification of the permissible tags or "markup codes" in a document, and their meanings. XML tags are delimited by the characters, "<" and ">". When a Document Type Definition (DTD) is available for a document, a universal reader (program) can parse the document and display or print it. |
domain |
|
domain controller |
|
Domain Name Service |
A computer program that converts between IP addresses and symbolic names for nodes on a network in a standard way. Domain Name Service (DNS) is defined by IETF RFC 1035. Most operating systems include a version of DNS. |
DoS |
Acronym for Denial of Service. |
double buffering |
{Historical} A technique used to increase data transfer rate by keeping two I/O requests outstanding. |
Double Data Rate |
|
DPU |
Shorthand for data processing unit |
DR |
Acronym for Disaster Recovery. |
DRAM |
Acronym for Dynamic Random Access Memory. |
drive |
Synonym for storage element (e.g., disk drive, solid state drive, or tape drive). |
drive letter |
A single letter of the alphabet by which applications and users identify a partition or physical or virtual disk to the Windows operating system. |
driver |
A host computer software component (usually part of an operating system) whose function is to control the operation of peripheral controllers or adapters attached to the host computer. Drivers manage communication and data transfer between applications and devices. |
DSA |
Acronym for Digital Signature Algorithm. |
DSaaS |
Acronym for Data Storage as a Service. |
DSS |
Acronym for Digital Signature Standard. |
DTD |
Acronym for Document Type Definition. |
dual active |
Synonym for active-active. |
Dual Inline Memory Module |
A set of random access memory integrated circuits or chips mounted on a circuit board, providing a 64-bit or greater data path using connectors on both sides of a single card edge. Abbreviated as DIMM. |
dual parity |
A synonym for RAID 6. |
due care |
The responsibility that managers and their organizations have a duty to provide for information security to ensure that the type of control, the cost of control, and the deployment of control are appropriate for the system being managed. [NIST SP 800-30] |
duplicate |
|
duplicate data |
Data that is redundant with data that is already in a dataset or I/O stream. |
Dynamic Host Control Protocol |
An Internet protocol that allows nodes to dynamically acquire ("lease") network addresses for periods of time. Dynamic Host Control Protocol (DHCP) simplifies the administration of networks by avoiding the need to pre-configure nodes. |
dynamic mapping |
A form of mapping in which the correspondence between addresses in the two address spaces can change over time. |
Dynamic Random Access Memory |
Byte-addressable computer memory that requires periodic refreshing. |
D_ID |
A three-byte field that contains the address identifier of the destination Nx_Port. |