Why DH2i
Product
New: DxOperator
DxEnterprise
DxOdyssey
Resources
Resource Center
Videos
Blog
Terms Glossary
Support
Partner
Partner Program
Partner Directory
Become a Partner
Partner Login
Schedule a demo
Free license
Search for:
Search
Glossary
Explore commonly used development and system architecture terms.
A
C
D
F
H
K
S
Z
A
AWS, Azure, EKS & Google Cloud
Key Takeaways AWS offers a wide range of services and has a consistent user experience. Azure integrates well with other Microsoft products and provides comprehensive…
C
Cloud Networking
Key Takeaways Cloud networking involves scalable, virtualized resources as a service over the internet. Hybrid clouds offer flexibility and more data deployment options. Advantages of…
Cloud Security
Key Takeaways Cloud security involves policies, technologies, and controls to protect data, applications, and infrastructure associated with cloud computing. Robust cloud security protocols are necessary…
Container Software
Key Takeaways Containers are lightweight, standalone, executable packages that include everything needed to run an application. Docker containers ensure that software works uniformly across different…
Continuous Data Protection
Key Takeaways Continuous data protection eliminates the need for a backup window by performing backups every few minutes. CDP creates an initial data copy to…
D
Data Transfer
Key Takeaways Different data transfer techniques have unique strengths and limitations. Optimization can improve data transfer efficiency. Speed optimization is crucial to combat bandwidth limitations…
F
Failover
Key Takeaways Failover is the process of automatically shifting to a backup system during a system failure. Failover is crucial for business continuity and mitigates…
H
High Availability
Key Takeaways High availability is a system design approach that ensures operational performance. It is crucial for maintaining uninterrupted services and business continuity. Implementing disaster…
K
Kubernetes
Key Takeaways Kubernetes provides robust security and networking capabilities, ensuring a secure environment for running containerized applications. It streamlines the app development cycle by managing,…
S
Software-Defined Perimeter
Key Takeaways SDP operates on the principle of 'trust no one, verify everyone' in network security. SDP establishes a network boundary that requires verification before…
SQL Server
Key Takeaways Optimal installation practices and advanced configuration techniques enhance performance, security, and reliability of SQL Server. Server maintenance practices, regular monitoring, and disaster recovery…
Z
Zero Trust Architecture
Key Takeaways Zero trust architecture is a security model that eliminates default trust for users and devices within the network perimeter, reducing the likelihood of…
Zero Trust Security
Key Takeaways Zero trust is a security framework that requires authentication, authorization, and continuous validation for all users. Zero trust can be applied to local,…
The Blog
Our Latest Industry News and Insights
Use Cases
Using Extended Vhosts for Unified HA/DR in Financial Services
Download
Event
Easily Migrate Business-Critical SQL Server Workloads to Containers on EKS
View Recording
Videos
Deploy a SQL Server AG in Amazon Elastic Kubernetes Service with DxOperator
Watch Now
Subscribe to Our Blog
Subscribe for industry-leading information on all things tech.
Native. Containerized. Anywhere in Between.
DH2i gets you closer to zero downtime.
Request a Demo