ⓘ Free online encyclopedia. Did you know? page 217

PeopleDoc

PeopleDoc by Ultimate Software is a cloud-based HR service delivery & HR document management platform. With offices in New York City, Toronto, Paris, and Stuttgart, PeopleDoc by Ultimate Software provides SaaS solutions that service over 2.5 mill ...

ShareMethods

ShareMethods is a Web 2.0 document management and collaboration service with a focus on sales, marketing, and the extended selling network. It offers a software as a service subscription service to companies that is available as a stand alone app ...

Square 9 Softworks

Originating in New Havens Ninth Square district, Square 9 Softworks was founded in 2001 as a division of InfiNet Business Systems. As an Enterprise Content Management solutions provider and software integration house, InfiNet Business Systems del ...

Help desk

A help desk is a resource intended to provide the customer or end user with information and support related to a companys or institutions products and services. The purpose of a help desk is usually to troubleshoot problems or provide guidance ab ...

Virtual help desk

A virtual help desk allows IT support organizations to virtually deploy IT technicians on demand to support a computer user experiencing technical issues. IT can efficiently manage and allocate global help desk resources, including – most importa ...

Vitalyst

Vitalyst is a technology support services company offering application and device support for more than 150 different software applications and mobile devices. Core competencies include support for corporate technology migrations and one-on-one s ...

Method engineering

Not to be confused with Methods engineering, a subspecialty of Industrial engineering Method engineering in the "field of information systems is the discipline to construct new methods from existing methods". It focuses on "the design, constructi ...

Method Framework for Engineering System Architectures

The Method Framework for Engineering System Architectures is a method engineering framework based on situational method engineering, which provides a method for developing appropriate, project-specific system architecture engineering methods. It ...

AIX Toolbox for Linux Applications

The AIX Toolbox for Linux Applications is a collection of GNU tools for IBM AIX. These tools are available for installation using Redhats RPM format.

/boot/

In Linux, and other Unix-like operating systems, the /boot/ directory holds files used in booting the operating system. The usage is standardized in the Filesystem Hierarchy Standard.

Bring your own operating system

Bring your own operating system relates to the practice of providing PC computers, usually without internally installed disks, so users can bring their own operating system and use the supplied hardware with the operating system of their choice. ...

CPU-Z

CPU-Z is a freeware system profiling and monitoring application for Microsoft Windows and Android that detects the central processing unit, RAM, motherboard chip-set, and other hardware features of a modern personal computer or Android device.

Cross-zone scripting

Cross-zone scripting is a browser exploit taking advantage of a vulnerability within a zone -based security solution. The attack allows content in unprivileged zones to be executed with the permissions of a privileged zone - i.e. a privilege esca ...

Cygwin

Cygwin is a POSIX-compatible environment that runs natively on Microsoft Windows. Its goal is to allow programs of Unix-like systems to be recompiled and run natively on Windows with minimal source code modifications by providing them with the sa ...

Disk quota

A disk quota is a limit set by a system administrator that restricts certain aspects of file system usage on modern operating systems. The function of using disk quotas is to allocate limited disk space in a reasonable way.

Dynamic software updating

In computer science, dynamic software updating is a field of research pertaining to upgrading programs while they are running. DSU is not currently widely used in industry. However, researchers have developed a wide variety of systems and techniq ...

EMCO Remote Installer

EMCO Remote Installer is a software distribution tool for Windows. It allows network administrators to install and uninstall software on remote Windows computers connected to a local network, and to audit installed software and Windows updates re ...

FreeBSD jail

The jail mechanism is an implementation of FreeBSDs OS-level virtualisation that allows system administrators to partition a FreeBSD-derived computer system into several independent mini-systems called jails, all sharing the same kernel, with ver ...

HP Integrated Lights-Out

Integrated Lights-Out, or iLO, is a proprietary embedded server management technology by Hewlett-Packard which provides out-of-band management facilities. The physical connection is an Ethernet port that can be found on most ProLiant servers and ...

Hw.sensors

The sysctl hw.sensors framework is a kernel-level hardware sensors framework originating from OpenBSD, which uses the sysctl kernel interface as the transport layer between the kernel and the userland. As of 2019, the framework is used by over a ...

Iftop

iftop is a free software command-line system monitor tool that produces a frequently updated list of network connections. By default, the connections are ordered by bandwidth usage, with only the "top" bandwidth consumers shown. The iftop website ...

Intel Active Management Technology

Intel Active Management Technology is hardware and firmware for remote out-of-band management of select business computers, running on the Intel Management Engine, a separate microprocessor not exposed to the user, in order to monitor, maintain, ...

Intelligent Platform Management Interface

The Intelligent Platform Management Interface is a set of computer interface specifications for an autonomous computer subsystem that provides management and monitoring capabilities independently of the host systems CPU, firmware and operating sy ...

LANlord

LANlord was a DOS, Windows, and OS/2 workstation management system originally developed by Client Server Technologies Group, which got seed funding from Microcom who ultimately later sold the LANlord group in February 1994 to Central Point Softwa ...

Loginventory

LOGINventory is an agentless network inventory tool written by Schmidts LOGIN GmbH. LOGINventory is compatible with Vista, Windows 7, Windows 8, Windows 10, Windows Server 2008 and Windows Server 2012 including 64Bit versions.

Microsoft Management Console

Microsoft Management Console is a component of Windows 2000 and its successors that provides system administrators and advanced users an interface for configuring and monitoring the system.

N+1 redundancy

N +1 redundancy is a form of resilience that ensures system availability in the event of component failure. Components have at least one independent backup component. The level of resilience is referred to as active/passive or standby as backup c ...

NC*SA

NC*SA is the abbreviation for the North Carolina System Administrators organization, a non-profit educational group focused on providing useful information for System Administrators in North Carolina, United States. NC*SA is based in the Research ...

Open Platform Management Architecture

Open Platform Management Architecture is an open, royalty free standard for connecting a modular, platform hardware management subsystem to a computer motherboard. Platform hardware management generally refers to the remote monitoring of platform ...

Open iT

Open iT, Inc. is an independent software vendor that specializes in metering, analyzing, and optimizing usage of critical IT assets. It was founded in 1999 by Eistein Fosli, who obtained his Master of Science in Information Technology from the Un ...

OpenManage

OpenManage, a Dell, Inc. product, consists of a number of network management and systems management applications. Although the name sounds like open source software, it is closed source.

Out-of-band management

In systems management, out-of-band management involves the use of management interfaces for managing and networking equipment. Out-of-band management allows the network operator to establish trust boundaries in accessing the management function t ...

PC migration

PC migration is the process of transferring the entire user environment between two computer systems. The migration problem is often associated with the concept of total cost of ownership where the requirement to migrate information is considered ...

PC Weasel 2000

PC Weasel 2000 was a line of graphics cards designed by Middle Digital Incorporated which output to a serial port instead of a monitor. This allows servers using PC hardware with conventional BIOSes or operating systems lacking serial capability ...

Reliable Event Logging Protocol

Reliable Event Logging Protocol, a networking protocol for computer data logging in computer networks, extends the functionality of the syslog protocol to provide reliable delivery of event messages. It is most often used in environments which do ...

RMClock

RMClock, short for RightMark CPU Clock Utility, is software developed by iXBT.com, distributed under the brand RightMark Gathering. A free version is available as is a licensed "pro" version. RightMark CPU Clock Utility RMClock is a small GUI app ...

SAGE-AU

SAGE-AU was an Australian non-profit professional association of system administrators. SAGE-AU was originally formed to provide the same services for Australian system administrators as the SAGE organisation did in the United States, but was com ...

Scalyr

Scalyr, Inc. is a unified observability and log management platform designed for modern application development and deployment practices. Scalyr is built to meet the scale and complexity introduced by microservices, orchestration and containers, ...

Service pack

In computing, a service pack comprises a collection of updates, fixes, or enhancements to a software program delivered in the form of a single installable package. Companies often release a service pack when the number of individual patches to a ...

Spiceworks

Spiceworks is a professional network for the information technology industry that is headquartered in Austin, Texas. The company was founded in January 2006 by Scott Abel, Jay Hallberg, Greg Kattawar, and Francis Sullivan to build IT management s ...

Standard Operating Environment

A standard operating environment is a standard implementation of an operating system and its associated software. Associated names and concepts include: Managed operating environment MOE Desktop managed services DMS Standard desktop configuration ...

Su (Unix)

The Unix command su, which stands for substitute user is used by a computer user to execute commands with the privileges of another user account. When executed it invokes a shell without changing the current working directory or the user environm ...

System monitor

A system monitor is a hardware or software component used to monitor system resources and performance in a computer system. Among the management issues regarding use of system monitoring tools are resource usage and privacy.

System profiler

A system profiler is a program that can provide detailed information about the software installed and hardware attached to a computer. Typically workstations and personal computers have had system profilers as a common feature since the mid-1990s ...

System request

System request is a key on personal computer keyboards that has no standard use. Introduced by IBM with the PC/AT, it was intended to be available as a special key to directly invoke low-level operating system functions with no possibility of con ...

Threat Stack

Threat Stack, Inc. is an American computer security software company. It bills itself as a provider of cloud security management and compliance solutions delivered using a Software as a service model, which is marketed to businesses and companies ...

TIBCO Hawk

TIBCO Hawk is a software product that allows monitoring and management of distributed computing applications. A very scalable product, it is notable for the number of these rule-based software agents deployed claimed by the vendor:

Top (software)

top is a task manager program found in many Unix-like operating systems that displays information about CPU and memory utilization.

Unix shell

A Unix shell is a command-line interpreter or shell that provides a command line user interface for Unix-like operating systems. The shell is both an interactive command language and a scripting language, and is used by the operating system to co ...

Unix2dos

unix2dos is a tool to convert line breaks in a text file from Unix format to DOS format and vice versa. When invoked as unix2dos the program will convert a Unix text file to DOS format, when invoked as dos2unix it will convert a DOS text file to ...