33 relations: Application checkpointing, Application programming interface, Authentication, Authorization, Blade server, C (programming language), Configuration management database, Distributed lock manager, Failover, Fault tolerance, Field-replaceable unit, Hardware Platform Interface, Information model, Integrity, Inter-process communication, ITU-T, Java (programming language), Managed object, Modular design, Multicast, Northbound interface, OpenSAF, Point-to-point (telecommunications), POSIX, Process (computing), Redundancy (engineering), Run time (program lifecycle phase), Scripting language, Security policy, Service Availability Forum, Symmetric multiprocessing, Unicast, UTF-8.
Checkpointing is a technique to add fault tolerance into computing systems.
In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building software.
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.
Authorization is the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.
A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical space and energy.
C (as in the letter ''c'') is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations.
A configuration management database (CMDB) is a data repository that acts as a data warehouse or inventory for information technology (IT) installations.
Operating systems use lock managers to organise and serialise the access to resources.
In computing and related technologies such as networking, failover is switching to a redundant or standby computer server, system, hardware component or network upon the failure or abnormal termination of the previously active application, server, system, hardware component, or network.
Fault tolerance is the property that enables a system to continue operating properly in the event of the failure (or one or more faults within) some of its components.
A field-replaceable unit (FRU) is a printed circuit board, part, or assembly that can be quickly and easily removed from a computer or other piece of electronic equipment, and replaced by the user or a technician without having to send the entire product or system to a repair facility.
The Hardware Platform Interface (HPI) is an open specification that defines an application programming interface (API) for platform management of computer systems.
An information model in software engineering is a representation of concepts and the relationships, constraints, rules, and operations to specify data semantics for a chosen domain of discourse.
Integrity is the quality of being honest and having strong moral principles, or moral uprightness.
In computer science, inter-process communication or interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data.
The ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors (divisions or units) of the International Telecommunication Union (ITU); it coordinates standards for telecommunications.
Java is a general-purpose computer-programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible.
In telecommunication, the term managed object has the following meanings: 1. In a network, an abstract representation of network resources that are managed.
Modular design, or "modularity in design", is a design approach that subdivides a system into smaller parts called modules or skids, that can be independently created and then used in different systems.
In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously.
In computer networking and computer architecture, a northbound interface of a component is an interface that conceptualizes the lower level details (e.g., data or functions) used by, or in, the component.
OpenSAF is an open-source software project to develop high availability middleware consistent with Service Availability Forum (SA Forum) specifications, under the LGPLv2.1 license.
In telecommunications, a point-to-point connection refers to a communications connection between two Communication endpoints or nodes.
The Portable Operating System Interface (POSIX) is a family of standards specified by the IEEE Computer Society for maintaining compatibility between operating systems.
In computing, a process is an instance of a computer program that is being executed.
In engineering, redundancy is the duplication of critical components or functions of a system with the intention of increasing reliability of the system, usually in the form of a backup or fail-safe, or to improve actual system performance, such as in the case of GNSS receivers, or multi-threaded computer processing.
In computer science, run time, runtime or execution time is the time during which a program is running (executing), in contrast to other program lifecycle phases such as compile time, link time and load time.
A scripting or script language is a programming language that supports scripts: programs written for a special run-time environment that automate the execution of tasks that could alternatively be executed one-by-one by a human operator.
Security policy is a definition of what it means to be secure for a system, organization or other entity.
The Service Availability Forum (SAF or SA Forum) is a consortium that develops, publishes, educates on and promotes open specifications for carrier-grade and mission-critical systems.
Symmetric multiprocessing (SMP) involves a multiprocessor computer hardware and software architecture where two or more identical processors are connected to a single, shared main memory, have full access to all input and output devices, and are controlled by a single operating system instance that treats all processors equally, reserving none for special purposes.
200px In computer networking, unicast refers to a one-to-one transmission from one point in the network to another point; that is, one sender and one receiver, each identified by a network address.
UTF-8 is a variable width character encoding capable of encoding all 1,112,064 valid code points in Unicode using one to four 8-bit bytes.